1 00:00:00,510 --> 00:00:09,870 [Music] 2 00:00:09,870 --> 00:00:09,880 [Music] 3 00:00:09,880 --> 00:00:13,740 [Music] we tend to think of hackers as 4 00:00:13,740 --> 00:00:13,750 we tend to think of hackers as 5 00:00:13,750 --> 00:00:16,660 we tend to think of hackers as individuals who perhaps work out of a 6 00:00:16,660 --> 00:00:16,670 individuals who perhaps work out of a 7 00:00:16,670 --> 00:00:18,040 individuals who perhaps work out of a basement and there's pizza boxes 8 00:00:18,040 --> 00:00:18,050 basement and there's pizza boxes 9 00:00:18,050 --> 00:00:19,510 basement and there's pizza boxes scattered everywhere and they never see 10 00:00:19,510 --> 00:00:19,520 scattered everywhere and they never see 11 00:00:19,520 --> 00:00:21,280 scattered everywhere and they never see the light of day when in truth in 12 00:00:21,280 --> 00:00:21,290 the light of day when in truth in 13 00:00:21,290 --> 00:00:24,609 the light of day when in truth in actuality the average hacker is a 14 00:00:24,609 --> 00:00:24,619 actuality the average hacker is a 15 00:00:24,619 --> 00:00:27,250 actuality the average hacker is a full-time working employee at your local 16 00:00:27,250 --> 00:00:27,260 full-time working employee at your local 17 00:00:27,260 --> 00:00:29,769 full-time working employee at your local business they are perhaps even high 18 00:00:29,769 --> 00:00:29,779 business they are perhaps even high 19 00:00:29,779 --> 00:00:31,900 business they are perhaps even high school students or college students and 20 00:00:31,900 --> 00:00:31,910 school students or college students and 21 00:00:31,910 --> 00:00:34,630 school students or college students and so when we face something like the Cova 22 00:00:34,630 --> 00:00:34,640 so when we face something like the Cova 23 00:00:34,640 --> 00:00:37,869 so when we face something like the Cova 19 pandemic we have to imagine that 24 00:00:37,869 --> 00:00:37,879 19 pandemic we have to imagine that 25 00:00:37,879 --> 00:00:41,110 19 pandemic we have to imagine that while we are basically in quarantine in 26 00:00:41,110 --> 00:00:41,120 while we are basically in quarantine in 27 00:00:41,120 --> 00:00:44,170 while we are basically in quarantine in our own homes what where is the hacker 28 00:00:44,170 --> 00:00:44,180 our own homes what where is the hacker 29 00:00:44,180 --> 00:00:47,530 our own homes what where is the hacker and that's why in the cybersecurity 30 00:00:47,530 --> 00:00:47,540 and that's why in the cybersecurity 31 00:00:47,540 --> 00:00:50,799 and that's why in the cybersecurity industry we fear that there may be more 32 00:00:50,799 --> 00:00:50,809 industry we fear that there may be more 33 00:00:50,809 --> 00:00:54,310 industry we fear that there may be more of a risk now than there was two three 34 00:00:54,310 --> 00:00:54,320 of a risk now than there was two three 35 00:00:54,320 --> 00:00:56,410 of a risk now than there was two three weeks ago as these hackers who 36 00:00:56,410 --> 00:00:56,420 weeks ago as these hackers who 37 00:00:56,420 --> 00:00:58,359 weeks ago as these hackers who previously were spending their day 38 00:00:58,359 --> 00:00:58,369 previously were spending their day 39 00:00:58,369 --> 00:01:00,369 previously were spending their day elsewhere and hacking during the 40 00:01:00,369 --> 00:01:00,379 elsewhere and hacking during the 41 00:01:00,379 --> 00:01:02,100 elsewhere and hacking during the weekends and evening hours are now 42 00:01:02,100 --> 00:01:02,110 weekends and evening hours are now 43 00:01:02,110 --> 00:01:04,960 weekends and evening hours are now spending their entire day working on 44 00:01:04,960 --> 00:01:04,970 spending their entire day working on 45 00:01:04,970 --> 00:01:07,149 spending their entire day working on exploits here to speak with me about 46 00:01:07,149 --> 00:01:07,159 exploits here to speak with me about 47 00:01:07,159 --> 00:01:09,580 exploits here to speak with me about some of the concerns that we could raise 48 00:01:09,580 --> 00:01:09,590 some of the concerns that we could raise 49 00:01:09,590 --> 00:01:11,230 some of the concerns that we could raise and some of the things that we should 50 00:01:11,230 --> 00:01:11,240 and some of the things that we should 51 00:01:11,240 --> 00:01:14,680 and some of the things that we should know about the dangers of the work from 52 00:01:14,680 --> 00:01:14,690 know about the dangers of the work from 53 00:01:14,690 --> 00:01:16,750 know about the dangers of the work from home environment is cyber security 54 00:01:16,750 --> 00:01:16,760 home environment is cyber security 55 00:01:16,760 --> 00:01:18,820 home environment is cyber security expert Stephen Cobb Stephen thank you 56 00:01:18,820 --> 00:01:18,830 expert Stephen Cobb Stephen thank you 57 00:01:18,830 --> 00:01:21,000 expert Stephen Cobb Stephen thank you for joining me well good to be here Robi 58 00:01:21,000 --> 00:01:21,010 for joining me well good to be here Robi 59 00:01:21,010 --> 00:01:23,920 for joining me well good to be here Robi Stephen I alluded to some of the concern 60 00:01:23,920 --> 00:01:23,930 Stephen I alluded to some of the concern 61 00:01:23,930 --> 00:01:26,830 Stephen I alluded to some of the concern in the cyber security industry with the 62 00:01:26,830 --> 00:01:26,840 in the cyber security industry with the 63 00:01:26,840 --> 00:01:29,800 in the cyber security industry with the fact that we do expect an elevation in 64 00:01:29,800 --> 00:01:29,810 fact that we do expect an elevation in 65 00:01:29,810 --> 00:01:31,750 fact that we do expect an elevation in the threat level when it comes to cyber 66 00:01:31,750 --> 00:01:31,760 the threat level when it comes to cyber 67 00:01:31,760 --> 00:01:35,890 the threat level when it comes to cyber security right and part of that comes 68 00:01:35,890 --> 00:01:35,900 security right and part of that comes 69 00:01:35,900 --> 00:01:39,610 security right and part of that comes from our need to work from home there 70 00:01:39,610 --> 00:01:39,620 from our need to work from home there 71 00:01:39,620 --> 00:01:41,170 from our need to work from home there are so many different technologies that 72 00:01:41,170 --> 00:01:41,180 are so many different technologies that 73 00:01:41,180 --> 00:01:42,399 are so many different technologies that we should be tapping into and the 74 00:01:42,399 --> 00:01:42,409 we should be tapping into and the 75 00:01:42,409 --> 00:01:45,670 we should be tapping into and the companies are tapping into can I just 76 00:01:45,670 --> 00:01:45,680 companies are tapping into can I just 77 00:01:45,680 --> 00:01:47,830 companies are tapping into can I just give you the opportunity to kind of open 78 00:01:47,830 --> 00:01:47,840 give you the opportunity to kind of open 79 00:01:47,840 --> 00:01:50,200 give you the opportunity to kind of open the floor to you to discuss how these 80 00:01:50,200 --> 00:01:50,210 the floor to you to discuss how these 81 00:01:50,210 --> 00:01:52,420 the floor to you to discuss how these technologies can be not only helpful but 82 00:01:52,420 --> 00:01:52,430 technologies can be not only helpful but 83 00:01:52,430 --> 00:01:55,590 technologies can be not only helpful but also dangerous in our organizations 84 00:01:55,590 --> 00:01:55,600 also dangerous in our organizations 85 00:01:55,600 --> 00:01:59,500 also dangerous in our organizations right so I think as you alluded to at 86 00:01:59,500 --> 00:01:59,510 right so I think as you alluded to at 87 00:01:59,510 --> 00:02:02,920 right so I think as you alluded to at the beginning the the activity of what I 88 00:02:02,920 --> 00:02:02,930 the beginning the the activity of what I 89 00:02:02,930 --> 00:02:05,560 the beginning the the activity of what I would call criminal hacking I mean if I 90 00:02:05,560 --> 00:02:05,570 would call criminal hacking I mean if I 91 00:02:05,570 --> 00:02:06,730 would call criminal hacking I mean if I these days I just tend to go to 92 00:02:06,730 --> 00:02:06,740 these days I just tend to go to 93 00:02:06,740 --> 00:02:11,229 these days I just tend to go to criminals oh you know criminal activity 94 00:02:11,229 --> 00:02:11,239 criminals oh you know criminal activity 95 00:02:11,239 --> 00:02:13,920 criminals oh you know criminal activity I don't think he's taking a break 96 00:02:13,920 --> 00:02:13,930 I don't think he's taking a break 97 00:02:13,930 --> 00:02:18,160 I don't think he's taking a break although criminals may be working from 98 00:02:18,160 --> 00:02:18,170 although criminals may be working from 99 00:02:18,170 --> 00:02:20,140 although criminals may be working from home now more than they were 100 00:02:20,140 --> 00:02:20,150 home now more than they were 101 00:02:20,150 --> 00:02:23,080 home now more than they were because it a lot of criminal hacking is 102 00:02:23,080 --> 00:02:23,090 because it a lot of criminal hacking is 103 00:02:23,090 --> 00:02:27,039 because it a lot of criminal hacking is pretty organized and you know takes 104 00:02:27,039 --> 00:02:27,049 pretty organized and you know takes 105 00:02:27,049 --> 00:02:28,539 pretty organized and you know takes place in a structured environment in 106 00:02:28,539 --> 00:02:28,549 place in a structured environment in 107 00:02:28,549 --> 00:02:31,149 place in a structured environment in many cases but through this disruption 108 00:02:31,149 --> 00:02:31,159 many cases but through this disruption 109 00:02:31,159 --> 00:02:36,429 many cases but through this disruption from the earliest outbreak news onwards 110 00:02:36,429 --> 00:02:36,439 from the earliest outbreak news onwards 111 00:02:36,439 --> 00:02:38,349 from the earliest outbreak news onwards we've seen a willingness by some 112 00:02:38,349 --> 00:02:38,359 we've seen a willingness by some 113 00:02:38,359 --> 00:02:41,740 we've seen a willingness by some criminals to exploit this some of the 114 00:02:41,740 --> 00:02:41,750 criminals to exploit this some of the 115 00:02:41,750 --> 00:02:45,490 criminals to exploit this some of the first things we saw were using the virus 116 00:02:45,490 --> 00:02:45,500 first things we saw were using the virus 117 00:02:45,500 --> 00:02:49,420 first things we saw were using the virus as a bait to get people to open phishing 118 00:02:49,420 --> 00:02:49,430 as a bait to get people to open phishing 119 00:02:49,430 --> 00:02:51,789 as a bait to get people to open phishing emails searching you know phishing 120 00:02:51,789 --> 00:02:51,799 emails searching you know phishing 121 00:02:51,799 --> 00:02:54,250 emails searching you know phishing emails which were sent to trick people 122 00:02:54,250 --> 00:02:54,260 emails which were sent to trick people 123 00:02:54,260 --> 00:02:58,030 emails which were sent to trick people into loading malicious code or visiting 124 00:02:58,030 --> 00:02:58,040 into loading malicious code or visiting 125 00:02:58,040 --> 00:03:01,930 into loading malicious code or visiting malicious websites and so if we can 126 00:03:01,930 --> 00:03:01,940 malicious websites and so if we can 127 00:03:01,940 --> 00:03:06,030 malicious websites and so if we can assume based on past experience of 128 00:03:06,030 --> 00:03:06,040 assume based on past experience of 129 00:03:06,040 --> 00:03:09,160 assume based on past experience of crisis situations that there will be 130 00:03:09,160 --> 00:03:09,170 crisis situations that there will be 131 00:03:09,170 --> 00:03:10,720 crisis situations that there will be part of the criminal element which will 132 00:03:10,720 --> 00:03:10,730 part of the criminal element which will 133 00:03:10,730 --> 00:03:15,179 part of the criminal element which will try and use that and for people who are 134 00:03:15,179 --> 00:03:15,189 try and use that and for people who are 135 00:03:15,189 --> 00:03:18,849 try and use that and for people who are working normally in an office with an IT 136 00:03:18,849 --> 00:03:18,859 working normally in an office with an IT 137 00:03:18,859 --> 00:03:21,039 working normally in an office with an IT support group either on the phone or 138 00:03:21,039 --> 00:03:21,049 support group either on the phone or 139 00:03:21,049 --> 00:03:24,689 support group either on the phone or down the hall they're not as exposed 140 00:03:24,689 --> 00:03:24,699 down the hall they're not as exposed 141 00:03:24,699 --> 00:03:30,129 down the hall they're not as exposed necessarily to that activity as when 142 00:03:30,129 --> 00:03:30,139 necessarily to that activity as when 143 00:03:30,139 --> 00:03:32,259 necessarily to that activity as when they're at home when they're at home 144 00:03:32,259 --> 00:03:32,269 they're at home when they're at home 145 00:03:32,269 --> 00:03:35,020 they're at home when they're at home typically a lot of employees aren't 146 00:03:35,020 --> 00:03:35,030 typically a lot of employees aren't 147 00:03:35,030 --> 00:03:38,140 typically a lot of employees aren't doing company work and so you've got 148 00:03:38,140 --> 00:03:38,150 doing company work and so you've got 149 00:03:38,150 --> 00:03:41,589 doing company work and so you've got this situation where people are in a 150 00:03:41,589 --> 00:03:41,599 this situation where people are in a 151 00:03:41,599 --> 00:03:43,899 this situation where people are in a different environment potentially using 152 00:03:43,899 --> 00:03:43,909 different environment potentially using 153 00:03:43,909 --> 00:03:46,990 different environment potentially using technology they're not familiar with and 154 00:03:46,990 --> 00:03:47,000 technology they're not familiar with and 155 00:03:47,000 --> 00:03:52,360 technology they're not familiar with and being potentially subject to attack by 156 00:03:52,360 --> 00:03:52,370 being potentially subject to attack by 157 00:03:52,370 --> 00:03:54,399 being potentially subject to attack by criminals in in some form or another 158 00:03:54,399 --> 00:03:54,409 criminals in in some form or another 159 00:03:54,409 --> 00:03:58,199 criminals in in some form or another now one of the things that that's 160 00:03:58,199 --> 00:03:58,209 now one of the things that that's 161 00:03:58,209 --> 00:04:00,909 now one of the things that that's interesting about the term work from 162 00:04:00,909 --> 00:04:00,919 interesting about the term work from 163 00:04:00,919 --> 00:04:04,330 interesting about the term work from home is that it encompasses a wide range 164 00:04:04,330 --> 00:04:04,340 home is that it encompasses a wide range 165 00:04:04,340 --> 00:04:07,360 home is that it encompasses a wide range of technologies and I think just about 166 00:04:07,360 --> 00:04:07,370 of technologies and I think just about 167 00:04:07,370 --> 00:04:09,819 of technologies and I think just about every organization and every company has 168 00:04:09,819 --> 00:04:09,829 every organization and every company has 169 00:04:09,829 --> 00:04:11,530 every organization and every company has it set up somewhat differently and 170 00:04:11,530 --> 00:04:11,540 it set up somewhat differently and 171 00:04:11,540 --> 00:04:14,159 it set up somewhat differently and depending on what that organization does 172 00:04:14,159 --> 00:04:14,169 depending on what that organization does 173 00:04:14,169 --> 00:04:17,589 depending on what that organization does in its day-to-day operations it may be 174 00:04:17,589 --> 00:04:17,599 in its day-to-day operations it may be 175 00:04:17,599 --> 00:04:23,279 in its day-to-day operations it may be more or less prepared for this situation 176 00:04:23,279 --> 00:04:23,289 more or less prepared for this situation 177 00:04:23,289 --> 00:04:24,750 more or less prepared for this situation right 178 00:04:24,750 --> 00:04:24,760 right 179 00:04:24,760 --> 00:04:27,240 right I was thinking a thing in the cut my my 180 00:04:27,240 --> 00:04:27,250 I was thinking a thing in the cut my my 181 00:04:27,250 --> 00:04:30,060 I was thinking a thing in the cut my my last employer you had maybe twenty five 182 00:04:30,060 --> 00:04:30,070 last employer you had maybe twenty five 183 00:04:30,070 --> 00:04:32,690 last employer you had maybe twenty five percent of people who were fully 184 00:04:32,690 --> 00:04:32,700 percent of people who were fully 185 00:04:32,700 --> 00:04:35,760 percent of people who were fully authorized to work remotely most of the 186 00:04:35,760 --> 00:04:35,770 authorized to work remotely most of the 187 00:04:35,770 --> 00:04:38,220 authorized to work remotely most of the time then he had maybe another twenty 188 00:04:38,220 --> 00:04:38,230 time then he had maybe another twenty 189 00:04:38,230 --> 00:04:40,500 time then he had maybe another twenty five percent who worked remotely some of 190 00:04:40,500 --> 00:04:40,510 five percent who worked remotely some of 191 00:04:40,510 --> 00:04:44,250 five percent who worked remotely some of the time and then you had the rest who 192 00:04:44,250 --> 00:04:44,260 the time and then you had the rest who 193 00:04:44,260 --> 00:04:47,880 the time and then you had the rest who are mainly office based each of those 194 00:04:47,880 --> 00:04:47,890 are mainly office based each of those 195 00:04:47,890 --> 00:04:50,960 are mainly office based each of those groups had a different technology 196 00:04:50,960 --> 00:04:50,970 groups had a different technology 197 00:04:50,970 --> 00:04:53,790 groups had a different technology structure in some ways the software they 198 00:04:53,790 --> 00:04:53,800 structure in some ways the software they 199 00:04:53,800 --> 00:04:56,400 structure in some ways the software they used to get to the company resources was 200 00:04:56,400 --> 00:04:56,410 used to get to the company resources was 201 00:04:56,410 --> 00:04:59,790 used to get to the company resources was different and different levels of 202 00:04:59,790 --> 00:04:59,800 different and different levels of 203 00:04:59,800 --> 00:05:03,090 different and different levels of experience with that hardware and 204 00:05:03,090 --> 00:05:03,100 experience with that hardware and 205 00:05:03,100 --> 00:05:06,270 experience with that hardware and software and so for example the sales 206 00:05:06,270 --> 00:05:06,280 software and so for example the sales 207 00:05:06,280 --> 00:05:08,970 software and so for example the sales team out in the field they were pretty 208 00:05:08,970 --> 00:05:08,980 team out in the field they were pretty 209 00:05:08,980 --> 00:05:11,820 team out in the field they were pretty upon how to get into systems they needed 210 00:05:11,820 --> 00:05:11,830 upon how to get into systems they needed 211 00:05:11,830 --> 00:05:14,760 upon how to get into systems they needed to use they were pretty savvy about 212 00:05:14,760 --> 00:05:14,770 to use they were pretty savvy about 213 00:05:14,770 --> 00:05:17,760 to use they were pretty savvy about security my former employer was he said 214 00:05:17,760 --> 00:05:17,770 security my former employer was he said 215 00:05:17,770 --> 00:05:20,060 security my former employer was he said a maker of security software so I think 216 00:05:20,060 --> 00:05:20,070 a maker of security software so I think 217 00:05:20,070 --> 00:05:23,450 a maker of security software so I think they got a lot of training on that but 218 00:05:23,450 --> 00:05:23,460 they got a lot of training on that but 219 00:05:23,460 --> 00:05:27,810 they got a lot of training on that but you have maybe 50 percent of the North 220 00:05:27,810 --> 00:05:27,820 you have maybe 50 percent of the North 221 00:05:27,820 --> 00:05:31,980 you have maybe 50 percent of the North America group for this company and any 222 00:05:31,980 --> 00:05:31,990 America group for this company and any 223 00:05:31,990 --> 00:05:33,990 America group for this company and any typical company I think you've got 224 00:05:33,990 --> 00:05:34,000 typical company I think you've got 225 00:05:34,000 --> 00:05:35,340 typical company I think you've got probably 50 percent of the people at 226 00:05:35,340 --> 00:05:35,350 probably 50 percent of the people at 227 00:05:35,350 --> 00:05:35,640 probably 50 percent of the people at least 228 00:05:35,640 --> 00:05:35,650 least 229 00:05:35,650 --> 00:05:39,480 least come on accustomed to using their 230 00:05:39,480 --> 00:05:39,490 come on accustomed to using their 231 00:05:39,490 --> 00:05:43,620 come on accustomed to using their computer at home to do work I'm not 232 00:05:43,620 --> 00:05:43,630 computer at home to do work I'm not 233 00:05:43,630 --> 00:05:45,120 computer at home to do work I'm not talking about just dialing in to get 234 00:05:45,120 --> 00:05:45,130 talking about just dialing in to get 235 00:05:45,130 --> 00:05:47,040 talking about just dialing in to get email I'm talking about doing their 236 00:05:47,040 --> 00:05:47,050 email I'm talking about doing their 237 00:05:47,050 --> 00:05:49,680 email I'm talking about doing their day-to-day work and right we have 238 00:05:49,680 --> 00:05:49,690 day-to-day work and right we have 239 00:05:49,690 --> 00:05:51,390 day-to-day work and right we have various technologies for that Remote 240 00:05:51,390 --> 00:05:51,400 various technologies for that Remote 241 00:05:51,400 --> 00:05:55,200 various technologies for that Remote Desktop Protocol remote access protocols 242 00:05:55,200 --> 00:05:55,210 Desktop Protocol remote access protocols 243 00:05:55,210 --> 00:05:59,910 Desktop Protocol remote access protocols and so on and so because this shift to 244 00:05:59,910 --> 00:05:59,920 and so on and so because this shift to 245 00:05:59,920 --> 00:06:02,490 and so on and so because this shift to work at home has come very quickly for 246 00:06:02,490 --> 00:06:02,500 work at home has come very quickly for 247 00:06:02,500 --> 00:06:04,860 work at home has come very quickly for some of these people there's a concern 248 00:06:04,860 --> 00:06:04,870 some of these people there's a concern 249 00:06:04,870 --> 00:06:08,610 some of these people there's a concern and I'm certainly not yeah many many of 250 00:06:08,610 --> 00:06:08,620 and I'm certainly not yeah many many of 251 00:06:08,620 --> 00:06:10,470 and I'm certainly not yeah many many of my colleagues in the profession have 252 00:06:10,470 --> 00:06:10,480 my colleagues in the profession have 253 00:06:10,480 --> 00:06:12,090 my colleagues in the profession have expressed this as a concern that people 254 00:06:12,090 --> 00:06:12,100 expressed this as a concern that people 255 00:06:12,100 --> 00:06:15,300 expressed this as a concern that people are not properly trained on how to do 256 00:06:15,300 --> 00:06:15,310 are not properly trained on how to do 257 00:06:15,310 --> 00:06:17,910 are not properly trained on how to do this securely on how to avoid common 258 00:06:17,910 --> 00:06:17,920 this securely on how to avoid common 259 00:06:17,920 --> 00:06:22,590 this securely on how to avoid common pitfalls they've left in many cases the 260 00:06:22,590 --> 00:06:22,600 pitfalls they've left in many cases the 261 00:06:22,600 --> 00:06:25,410 pitfalls they've left in many cases the workers at home now have left a kind of 262 00:06:25,410 --> 00:06:25,420 workers at home now have left a kind of 263 00:06:25,420 --> 00:06:32,399 workers at home now have left a kind of secure environment to do their work so 264 00:06:32,399 --> 00:06:32,409 secure environment to do their work so 265 00:06:32,409 --> 00:06:34,109 secure environment to do their work so I have to say there's been some very 266 00:06:34,109 --> 00:06:34,119 I have to say there's been some very 267 00:06:34,119 --> 00:06:37,079 I have to say there's been some very impressive work by people in the InfoSec 268 00:06:37,079 --> 00:06:37,089 impressive work by people in the InfoSec 269 00:06:37,089 --> 00:06:39,600 impressive work by people in the InfoSec community to provide online tips and 270 00:06:39,600 --> 00:06:39,610 community to provide online tips and 271 00:06:39,610 --> 00:06:41,820 community to provide online tips and advice to write articles and blog posts 272 00:06:41,820 --> 00:06:41,830 advice to write articles and blog posts 273 00:06:41,830 --> 00:06:46,769 advice to write articles and blog posts and you know help raise awareness of 274 00:06:46,769 --> 00:06:46,779 and you know help raise awareness of 275 00:06:46,779 --> 00:06:49,709 and you know help raise awareness of this problem and help provide solutions 276 00:06:49,709 --> 00:06:49,719 this problem and help provide solutions 277 00:06:49,719 --> 00:06:54,149 this problem and help provide solutions but one of the weak links here I think 278 00:06:54,149 --> 00:06:54,159 but one of the weak links here I think 279 00:06:54,159 --> 00:06:57,839 but one of the weak links here I think is going to be actually IT departments 280 00:06:57,839 --> 00:06:57,849 is going to be actually IT departments 281 00:06:57,849 --> 00:07:02,219 is going to be actually IT departments themselves because you they've also got 282 00:07:02,219 --> 00:07:02,229 themselves because you they've also got 283 00:07:02,229 --> 00:07:05,549 themselves because you they've also got to deal with this whole virus problem in 284 00:07:05,549 --> 00:07:05,559 to deal with this whole virus problem in 285 00:07:05,559 --> 00:07:09,029 to deal with this whole virus problem in their family lives now they're being 286 00:07:09,029 --> 00:07:09,039 their family lives now they're being 287 00:07:09,039 --> 00:07:11,579 their family lives now they're being asked to shift maybe their focus of work 288 00:07:11,579 --> 00:07:11,589 asked to shift maybe their focus of work 289 00:07:11,589 --> 00:07:14,009 asked to shift maybe their focus of work to take on more work to support more 290 00:07:14,009 --> 00:07:14,019 to take on more work to support more 291 00:07:14,019 --> 00:07:16,859 to take on more work to support more people I mean if you think of half a 292 00:07:16,859 --> 00:07:16,869 people I mean if you think of half a 293 00:07:16,869 --> 00:07:20,279 people I mean if you think of half a work force at a company using technology 294 00:07:20,279 --> 00:07:20,289 work force at a company using technology 295 00:07:20,289 --> 00:07:23,009 work force at a company using technology they're not familiar with you know 296 00:07:23,009 --> 00:07:23,019 they're not familiar with you know 297 00:07:23,019 --> 00:07:26,249 they're not familiar with you know that's a that's a significant 298 00:07:26,249 --> 00:07:26,259 that's a that's a significant 299 00:07:26,259 --> 00:07:30,989 that's a that's a significant potentially in support calls and and so 300 00:07:30,989 --> 00:07:30,999 potentially in support calls and and so 301 00:07:30,999 --> 00:07:35,249 potentially in support calls and and so I think you know we have to look in you 302 00:07:35,249 --> 00:07:35,259 I think you know we have to look in you 303 00:07:35,259 --> 00:07:39,449 I think you know we have to look in you know good stress factors there and then 304 00:07:39,449 --> 00:07:39,459 know good stress factors there and then 305 00:07:39,459 --> 00:07:40,859 know good stress factors there and then also we have to look at stress factors 306 00:07:40,859 --> 00:07:40,869 also we have to look at stress factors 307 00:07:40,869 --> 00:07:43,829 also we have to look at stress factors on the systems we're seeing Nike shoes 308 00:07:43,829 --> 00:07:43,839 on the systems we're seeing Nike shoes 309 00:07:43,839 --> 00:07:49,169 on the systems we're seeing Nike shoes yeah like your your face is occasionally 310 00:07:49,169 --> 00:07:49,179 yeah like your your face is occasionally 311 00:07:49,179 --> 00:07:50,129 yeah like your your face is occasionally freezing a little bit and there's 312 00:07:50,129 --> 00:07:50,139 freezing a little bit and there's 313 00:07:50,139 --> 00:07:53,040 freezing a little bit and there's conversation oh yeah yeah and we've seen 314 00:07:53,040 --> 00:07:53,050 conversation oh yeah yeah and we've seen 315 00:07:53,050 --> 00:07:56,850 conversation oh yeah yeah and we've seen I'm in Europe I'm in the UK which is 316 00:07:56,850 --> 00:07:56,860 I'm in Europe I'm in the UK which is 317 00:07:56,860 --> 00:07:59,029 I'm in Europe I'm in the UK which is still in New York for the moment 318 00:07:59,029 --> 00:07:59,039 still in New York for the moment 319 00:07:59,039 --> 00:08:01,350 still in New York for the moment reduction in picture quality on 320 00:08:01,350 --> 00:08:01,360 reduction in picture quality on 321 00:08:01,360 --> 00:08:04,679 reduction in picture quality on streaming services which companies might 322 00:08:04,679 --> 00:08:04,689 streaming services which companies might 323 00:08:04,689 --> 00:08:07,709 streaming services which companies might let Netflix have agreed to to alleviate 324 00:08:07,709 --> 00:08:07,719 let Netflix have agreed to to alleviate 325 00:08:07,719 --> 00:08:10,739 let Netflix have agreed to to alleviate the problem about a week ago a colleague 326 00:08:10,739 --> 00:08:10,749 the problem about a week ago a colleague 327 00:08:10,749 --> 00:08:12,989 the problem about a week ago a colleague in Manchester which is a big city in the 328 00:08:12,989 --> 00:08:12,999 in Manchester which is a big city in the 329 00:08:12,999 --> 00:08:15,709 in Manchester which is a big city in the north of England said they were running 330 00:08:15,709 --> 00:08:15,719 north of England said they were running 331 00:08:15,719 --> 00:08:18,479 north of England said they were running 10% bandwidth consumption in the city 332 00:08:18,479 --> 00:08:18,489 10% bandwidth consumption in the city 333 00:08:18,489 --> 00:08:21,179 10% bandwidth consumption in the city was running 10% above it what it was wow 334 00:08:21,179 --> 00:08:21,189 was running 10% above it what it was wow 335 00:08:21,189 --> 00:08:27,049 was running 10% above it what it was wow I young you know I'm on a potentially 336 00:08:27,049 --> 00:08:27,059 I young you know I'm on a potentially 337 00:08:27,059 --> 00:08:30,829 I young you know I'm on a potentially 360 megabit per second fiber connection 338 00:08:30,829 --> 00:08:30,839 360 megabit per second fiber connection 339 00:08:30,839 --> 00:08:33,509 360 megabit per second fiber connection some parts of the UK have very good 340 00:08:33,509 --> 00:08:33,519 some parts of the UK have very good 341 00:08:33,519 --> 00:08:35,730 some parts of the UK have very good connections there's not so much but 342 00:08:35,730 --> 00:08:35,740 connections there's not so much but 343 00:08:35,740 --> 00:08:38,790 connections there's not so much but we're quite lucky we're where we live 344 00:08:38,790 --> 00:08:38,800 we're quite lucky we're where we live 345 00:08:38,800 --> 00:08:41,069 we're quite lucky we're where we live but the performance of that has really 346 00:08:41,069 --> 00:08:41,079 but the performance of that has really 347 00:08:41,079 --> 00:08:48,030 but the performance of that has really been drained by jumps in usage certain 348 00:08:48,030 --> 00:08:48,040 been drained by jumps in usage certain 349 00:08:48,040 --> 00:08:54,739 been drained by jumps in usage certain times of the day you know it used to be 350 00:08:54,739 --> 00:08:54,749 351 00:08:54,749 --> 00:08:59,009 people coming home from work starting 352 00:08:59,009 --> 00:08:59,019 people coming home from work starting 353 00:08:59,019 --> 00:09:02,489 people coming home from work starting torch streaming stuff at home would 354 00:09:02,489 --> 00:09:02,499 torch streaming stuff at home would 355 00:09:02,499 --> 00:09:05,220 torch streaming stuff at home would produce you know a buildup of demand in 356 00:09:05,220 --> 00:09:05,230 produce you know a buildup of demand in 357 00:09:05,230 --> 00:09:08,249 produce you know a buildup of demand in bandwidth and you know and then 358 00:09:08,249 --> 00:09:08,259 bandwidth and you know and then 359 00:09:08,259 --> 00:09:10,350 bandwidth and you know and then everybody had to slow down a little bit 360 00:09:10,350 --> 00:09:10,360 everybody had to slow down a little bit 361 00:09:10,360 --> 00:09:12,359 everybody had to slow down a little bit now you're seeing some of that during 362 00:09:12,359 --> 00:09:12,369 now you're seeing some of that during 363 00:09:12,369 --> 00:09:15,059 now you're seeing some of that during the day because you're getting this 364 00:09:15,059 --> 00:09:15,069 the day because you're getting this 365 00:09:15,069 --> 00:09:17,999 the day because you're getting this bandwidth shift to different parts of 366 00:09:17,999 --> 00:09:18,009 bandwidth shift to different parts of 367 00:09:18,009 --> 00:09:21,869 bandwidth shift to different parts of the network right so company internet 368 00:09:21,869 --> 00:09:21,879 the network right so company internet 369 00:09:21,879 --> 00:09:23,850 the network right so company internet connections are handled through big data 370 00:09:23,850 --> 00:09:23,860 connections are handled through big data 371 00:09:23,860 --> 00:09:26,359 connections are handled through big data centers and you know at different levels 372 00:09:26,359 --> 00:09:26,369 centers and you know at different levels 373 00:09:26,369 --> 00:09:30,299 centers and you know at different levels service provider from domestic and so 374 00:09:30,299 --> 00:09:30,309 service provider from domestic and so 375 00:09:30,309 --> 00:09:32,639 service provider from domestic and so you know you've got the shift of traffic 376 00:09:32,639 --> 00:09:32,649 you know you've got the shift of traffic 377 00:09:32,649 --> 00:09:36,749 you know you've got the shift of traffic into networks which are not as prepared 378 00:09:36,749 --> 00:09:36,759 into networks which are not as prepared 379 00:09:36,759 --> 00:09:38,939 into networks which are not as prepared to deal with it as you know main 380 00:09:38,939 --> 00:09:38,949 to deal with it as you know main 381 00:09:38,949 --> 00:09:42,119 to deal with it as you know main providers you know so we go a lot of 382 00:09:42,119 --> 00:09:42,129 providers you know so we go a lot of 383 00:09:42,129 --> 00:09:45,470 providers you know so we go a lot of these issues what I fear is that 384 00:09:45,470 --> 00:09:45,480 these issues what I fear is that 385 00:09:45,480 --> 00:09:48,569 these issues what I fear is that employees who aren't you recently 386 00:09:48,569 --> 00:09:48,579 employees who aren't you recently 387 00:09:48,579 --> 00:09:51,030 employees who aren't you recently updated shall we say on their security 388 00:09:51,030 --> 00:09:51,040 updated shall we say on their security 389 00:09:51,040 --> 00:09:52,980 updated shall we say on their security awareness training yeah I mean they 390 00:09:52,980 --> 00:09:52,990 awareness training yeah I mean they 391 00:09:52,990 --> 00:09:55,859 awareness training yeah I mean they joined that three years ago and kena can 392 00:09:55,859 --> 00:09:55,869 joined that three years ago and kena can 393 00:09:55,869 --> 00:09:59,460 joined that three years ago and kena can I put a slightly different perspective 394 00:09:59,460 --> 00:09:59,470 I put a slightly different perspective 395 00:09:59,470 --> 00:10:01,530 I put a slightly different perspective on it as well Steven in that you know 396 00:10:01,530 --> 00:10:01,540 on it as well Steven in that you know 397 00:10:01,540 --> 00:10:03,210 on it as well Steven in that you know we're thinking in the context of ok so 398 00:10:03,210 --> 00:10:03,220 we're thinking in the context of ok so 399 00:10:03,220 --> 00:10:05,970 we're thinking in the context of ok so coming from a company like ESET as you 400 00:10:05,970 --> 00:10:05,980 coming from a company like ESET as you 401 00:10:05,980 --> 00:10:07,319 coming from a company like ESET as you mentioned your previous employer it's 402 00:10:07,319 --> 00:10:07,329 mentioned your previous employer it's 403 00:10:07,329 --> 00:10:09,389 mentioned your previous employer it's big company thousands of employees 404 00:10:09,389 --> 00:10:09,399 big company thousands of employees 405 00:10:09,399 --> 00:10:11,549 big company thousands of employees they're obviously very security 406 00:10:11,549 --> 00:10:11,559 they're obviously very security 407 00:10:11,559 --> 00:10:14,160 they're obviously very security conscious and they understand and a lot 408 00:10:14,160 --> 00:10:14,170 conscious and they understand and a lot 409 00:10:14,170 --> 00:10:15,960 conscious and they understand and a lot of the folks that work there understand 410 00:10:15,960 --> 00:10:15,970 of the folks that work there understand 411 00:10:15,970 --> 00:10:18,269 of the folks that work there understand best security practices and you have 412 00:10:18,269 --> 00:10:18,279 best security practices and you have 413 00:10:18,279 --> 00:10:21,239 best security practices and you have training in place but looking at our at 414 00:10:21,239 --> 00:10:21,249 training in place but looking at our at 415 00:10:21,249 --> 00:10:25,350 training in place but looking at our at this shift that is a result of kovat 19 416 00:10:25,350 --> 00:10:25,360 this shift that is a result of kovat 19 417 00:10:25,360 --> 00:10:28,350 this shift that is a result of kovat 19 and and the government decisions around 418 00:10:28,350 --> 00:10:28,360 and and the government decisions around 419 00:10:28,360 --> 00:10:32,970 and and the government decisions around protecting its citizens we're talking a 420 00:10:32,970 --> 00:10:32,980 protecting its citizens we're talking a 421 00:10:32,980 --> 00:10:36,090 protecting its citizens we're talking a shift entirely from those big businesses 422 00:10:36,090 --> 00:10:36,100 shift entirely from those big businesses 423 00:10:36,100 --> 00:10:37,889 shift entirely from those big businesses who have fifty percent of their 424 00:10:37,889 --> 00:10:37,899 who have fifty percent of their 425 00:10:37,899 --> 00:10:41,269 who have fifty percent of their workforce working in the field to 426 00:10:41,269 --> 00:10:41,279 workforce working in the field to 427 00:10:41,279 --> 00:10:45,359 workforce working in the field to mom-and-pop shops to every little IT 428 00:10:45,359 --> 00:10:45,369 mom-and-pop shops to every little IT 429 00:10:45,369 --> 00:10:48,929 mom-and-pop shops to every little IT firm that normally just provides walk-in 430 00:10:48,929 --> 00:10:48,939 firm that normally just provides walk-in 431 00:10:48,939 --> 00:10:51,960 firm that normally just provides walk-in service to to 432 00:10:51,960 --> 00:10:51,970 service to to 433 00:10:51,970 --> 00:10:55,499 service to to contractors to builders to all these 434 00:10:55,499 --> 00:10:55,509 contractors to builders to all these 435 00:10:55,509 --> 00:10:58,230 contractors to builders to all these different industries that now need to 436 00:10:58,230 --> 00:10:58,240 different industries that now need to 437 00:10:58,240 --> 00:10:59,790 different industries that now need to still be able to operate their business 438 00:10:59,790 --> 00:10:59,800 still be able to operate their business 439 00:10:59,800 --> 00:11:01,769 still be able to operate their business but they're they're being told stay at 440 00:11:01,769 --> 00:11:01,779 but they're they're being told stay at 441 00:11:01,779 --> 00:11:04,139 but they're they're being told stay at home yeah so these are people that are 442 00:11:04,139 --> 00:11:04,149 home yeah so these are people that are 443 00:11:04,149 --> 00:11:06,360 home yeah so these are people that are not so cybersecurity conscious they're 444 00:11:06,360 --> 00:11:06,370 not so cybersecurity conscious they're 445 00:11:06,370 --> 00:11:09,480 not so cybersecurity conscious they're not trained in cybersecurity practices 446 00:11:09,480 --> 00:11:09,490 not trained in cybersecurity practices 447 00:11:09,490 --> 00:11:14,129 not trained in cybersecurity practices and and so how can we as a community and 448 00:11:14,129 --> 00:11:14,139 and and so how can we as a community and 449 00:11:14,139 --> 00:11:18,660 and and so how can we as a community and how can we as a podcast help to provide 450 00:11:18,660 --> 00:11:18,670 how can we as a podcast help to provide 451 00:11:18,670 --> 00:11:21,869 how can we as a podcast help to provide some advice I suppose to those users who 452 00:11:21,869 --> 00:11:21,879 some advice I suppose to those users who 453 00:11:21,879 --> 00:11:25,319 some advice I suppose to those users who are now thrust into this like nobody saw 454 00:11:25,319 --> 00:11:25,329 are now thrust into this like nobody saw 455 00:11:25,329 --> 00:11:27,990 are now thrust into this like nobody saw this coming nobody knew that we were 456 00:11:27,990 --> 00:11:28,000 this coming nobody knew that we were 457 00:11:28,000 --> 00:11:29,429 this coming nobody knew that we were going to be working from home 458 00:11:29,429 --> 00:11:29,439 going to be working from home 459 00:11:29,439 --> 00:11:32,369 going to be working from home halfway through March right what can 460 00:11:32,369 --> 00:11:32,379 halfway through March right what can 461 00:11:32,379 --> 00:11:34,410 halfway through March right what can what can we say to those individuals so 462 00:11:34,410 --> 00:11:34,420 what can we say to those individuals so 463 00:11:34,420 --> 00:11:39,449 what can we say to those individuals so I think there are resources available 464 00:11:39,449 --> 00:11:39,459 I think there are resources available 465 00:11:39,459 --> 00:11:45,509 I think there are resources available and you know referring back to ISA they 466 00:11:45,509 --> 00:11:45,519 and you know referring back to ISA they 467 00:11:45,519 --> 00:11:47,790 and you know referring back to ISA they have a very good security awareness 468 00:11:47,790 --> 00:11:47,800 have a very good security awareness 469 00:11:47,800 --> 00:11:49,980 have a very good security awareness training program that anybody can sign 470 00:11:49,980 --> 00:11:49,990 training program that anybody can sign 471 00:11:49,990 --> 00:11:53,879 training program that anybody can sign up to use for free and there are a 472 00:11:53,879 --> 00:11:53,889 up to use for free and there are a 473 00:11:53,889 --> 00:11:56,910 up to use for free and there are a number of companies quite a few now that 474 00:11:56,910 --> 00:11:56,920 number of companies quite a few now that 475 00:11:56,920 --> 00:11:59,490 number of companies quite a few now that that offer you know the basics cyber 476 00:11:59,490 --> 00:11:59,500 that offer you know the basics cyber 477 00:11:59,500 --> 00:12:02,189 that offer you know the basics cyber security awareness training which you 478 00:12:02,189 --> 00:12:02,199 security awareness training which you 479 00:12:02,199 --> 00:12:05,220 security awareness training which you know good training lets you know what 480 00:12:05,220 --> 00:12:05,230 know good training lets you know what 481 00:12:05,230 --> 00:12:08,040 know good training lets you know what the threats are you know what why is 482 00:12:08,040 --> 00:12:08,050 the threats are you know what why is 483 00:12:08,050 --> 00:12:11,429 the threats are you know what why is this happening so that employees will 484 00:12:11,429 --> 00:12:11,439 this happening so that employees will 485 00:12:11,439 --> 00:12:14,759 this happening so that employees will know I like to put it you know the 486 00:12:14,759 --> 00:12:14,769 know I like to put it you know the 487 00:12:14,769 --> 00:12:17,790 know I like to put it you know the extent to which criminals will go to you 488 00:12:17,790 --> 00:12:17,800 extent to which criminals will go to you 489 00:12:17,800 --> 00:12:20,639 extent to which criminals will go to you know abuse systems to steal information 490 00:12:20,639 --> 00:12:20,649 know abuse systems to steal information 491 00:12:20,649 --> 00:12:23,490 know abuse systems to steal information to ransomware systems that is hold them 492 00:12:23,490 --> 00:12:23,500 to ransomware systems that is hold them 493 00:12:23,500 --> 00:12:28,019 to ransomware systems that is hold them up for per Ansem and then the things 494 00:12:28,019 --> 00:12:28,029 up for per Ansem and then the things 495 00:12:28,029 --> 00:12:30,600 up for per Ansem and then the things that they can do to protect and if there 496 00:12:30,600 --> 00:12:30,610 that they can do to protect and if there 497 00:12:30,610 --> 00:12:34,410 that they can do to protect and if there was one thing I would say is understand 498 00:12:34,410 --> 00:12:34,420 was one thing I would say is understand 499 00:12:34,420 --> 00:12:36,240 was one thing I would say is understand what phishing is understand whether 500 00:12:36,240 --> 00:12:36,250 what phishing is understand whether 501 00:12:36,250 --> 00:12:39,210 what phishing is understand whether email threat is because that's still one 502 00:12:39,210 --> 00:12:39,220 email threat is because that's still one 503 00:12:39,220 --> 00:12:42,079 email threat is because that's still one of the preferred methods of attack 504 00:12:42,079 --> 00:12:42,089 of the preferred methods of attack 505 00:12:42,089 --> 00:12:47,189 of the preferred methods of attack attack vectors as as we say look at your 506 00:12:47,189 --> 00:12:47,199 attack vectors as as we say look at your 507 00:12:47,199 --> 00:12:51,620 attack vectors as as we say look at your email and and it's quite interesting 508 00:12:51,620 --> 00:12:51,630 email and and it's quite interesting 509 00:12:51,630 --> 00:12:53,900 email and and it's quite interesting one of the effects of this crisis has 510 00:12:53,900 --> 00:12:53,910 one of the effects of this crisis has 511 00:12:53,910 --> 00:12:56,420 one of the effects of this crisis has been and I various people have remarked 512 00:12:56,420 --> 00:12:56,430 been and I various people have remarked 513 00:12:56,430 --> 00:12:58,130 been and I various people have remarked about this and increase in the emails 514 00:12:58,130 --> 00:12:58,140 about this and increase in the emails 515 00:12:58,140 --> 00:13:01,790 about this and increase in the emails that you're getting from people who you 516 00:13:01,790 --> 00:13:01,800 that you're getting from people who you 517 00:13:01,800 --> 00:13:03,970 that you're getting from people who you kind of remember or maybe done I mean 518 00:13:03,970 --> 00:13:03,980 kind of remember or maybe done I mean 519 00:13:03,980 --> 00:13:06,530 kind of remember or maybe done I mean clearly there are companies around the 520 00:13:06,530 --> 00:13:06,540 clearly there are companies around the 521 00:13:06,540 --> 00:13:08,690 clearly there are companies around the world who are emailing everybody on 522 00:13:08,690 --> 00:13:08,700 world who are emailing everybody on 523 00:13:08,700 --> 00:13:11,510 world who are emailing everybody on their mailing list or anyone they have 524 00:13:11,510 --> 00:13:11,520 their mailing list or anyone they have 525 00:13:11,520 --> 00:13:14,240 their mailing list or anyone they have ever had contact with to say hey we're 526 00:13:14,240 --> 00:13:14,250 ever had contact with to say hey we're 527 00:13:14,250 --> 00:13:16,280 ever had contact with to say hey we're here to help we're you in COBIT 19 is 528 00:13:16,280 --> 00:13:16,290 here to help we're you in COBIT 19 is 529 00:13:16,290 --> 00:13:18,380 here to help we're you in COBIT 19 is making this difference and only some of 530 00:13:18,380 --> 00:13:18,390 making this difference and only some of 531 00:13:18,390 --> 00:13:20,420 making this difference and only some of these messages are great and some of 532 00:13:20,420 --> 00:13:20,430 these messages are great and some of 533 00:13:20,430 --> 00:13:22,400 these messages are great and some of them are important some of them were for 534 00:13:22,400 --> 00:13:22,410 them are important some of them were for 535 00:13:22,410 --> 00:13:24,260 them are important some of them were for products you don't own anymore so you're 536 00:13:24,260 --> 00:13:24,270 products you don't own anymore so you're 537 00:13:24,270 --> 00:13:27,680 products you don't own anymore so you're not so interested but what you've got is 538 00:13:27,680 --> 00:13:27,690 not so interested but what you've got is 539 00:13:27,690 --> 00:13:31,000 not so interested but what you've got is an email situation which is rife for 540 00:13:31,000 --> 00:13:31,010 an email situation which is rife for 541 00:13:31,010 --> 00:13:35,480 an email situation which is rife for fake emails where you know with 542 00:13:35,480 --> 00:13:35,490 fake emails where you know with 543 00:13:35,490 --> 00:13:38,270 fake emails where you know with potentially the offer of updated 544 00:13:38,270 --> 00:13:38,280 potentially the offer of updated 545 00:13:38,280 --> 00:13:43,490 potentially the offer of updated information on on Kovac 19 check the 546 00:13:43,490 --> 00:13:43,500 information on on Kovac 19 check the 547 00:13:43,500 --> 00:13:49,780 information on on Kovac 19 check the latest cures for Kovac 19 yep alluring 548 00:13:49,780 --> 00:13:49,790 latest cures for Kovac 19 yep alluring 549 00:13:49,790 --> 00:13:52,520 latest cures for Kovac 19 yep alluring titles in the subject matter that people 550 00:13:52,520 --> 00:13:52,530 titles in the subject matter that people 551 00:13:52,530 --> 00:13:54,440 titles in the subject matter that people are going to be tempted to click on if 552 00:13:54,440 --> 00:13:54,450 are going to be tempted to click on if 553 00:13:54,450 --> 00:13:57,680 are going to be tempted to click on if those have got through their email 554 00:13:57,680 --> 00:13:57,690 those have got through their email 555 00:13:57,690 --> 00:14:00,140 those have got through their email service and their security software I 556 00:14:00,140 --> 00:14:00,150 service and their security software I 557 00:14:00,150 --> 00:14:04,010 service and their security software I think whether it's it's a company 558 00:14:04,010 --> 00:14:04,020 think whether it's it's a company 559 00:14:04,020 --> 00:14:06,920 think whether it's it's a company decision or an individual decision you 560 00:14:06,920 --> 00:14:06,930 decision or an individual decision you 561 00:14:06,930 --> 00:14:09,380 decision or an individual decision you have to be running a really good piece 562 00:14:09,380 --> 00:14:09,390 have to be running a really good piece 563 00:14:09,390 --> 00:14:11,510 have to be running a really good piece of security software a security software 564 00:14:11,510 --> 00:14:11,520 of security software a security software 565 00:14:11,520 --> 00:14:14,420 of security software a security software suite on your system now you know 566 00:14:14,420 --> 00:14:14,430 suite on your system now you know 567 00:14:14,430 --> 00:14:17,210 suite on your system now you know Windows comes with some protection built 568 00:14:17,210 --> 00:14:17,220 Windows comes with some protection built 569 00:14:17,220 --> 00:14:20,570 Windows comes with some protection built in but the different methods of attack 570 00:14:20,570 --> 00:14:20,580 in but the different methods of attack 571 00:14:20,580 --> 00:14:22,430 in but the different methods of attack and approaches of attack need to be 572 00:14:22,430 --> 00:14:22,440 and approaches of attack need to be 573 00:14:22,440 --> 00:14:25,910 and approaches of attack need to be covered by a security software suite one 574 00:14:25,910 --> 00:14:25,920 covered by a security software suite one 575 00:14:25,920 --> 00:14:28,220 covered by a security software suite one of the things that we see with with less 576 00:14:28,220 --> 00:14:28,230 of the things that we see with with less 577 00:14:28,230 --> 00:14:31,250 of the things that we see with with less experienced users and smaller companies 578 00:14:31,250 --> 00:14:31,260 experienced users and smaller companies 579 00:14:31,260 --> 00:14:33,830 experienced users and smaller companies is that they may be under the impression 580 00:14:33,830 --> 00:14:33,840 is that they may be under the impression 581 00:14:33,840 --> 00:14:36,290 is that they may be under the impression they've got security software because 582 00:14:36,290 --> 00:14:36,300 they've got security software because 583 00:14:36,300 --> 00:14:39,350 they've got security software because there's a logo on the desktop for the 584 00:14:39,350 --> 00:14:39,360 there's a logo on the desktop for the 585 00:14:39,360 --> 00:14:41,840 there's a logo on the desktop for the product which was there from when it was 586 00:14:41,840 --> 00:14:41,850 product which was there from when it was 587 00:14:41,850 --> 00:14:43,730 product which was there from when it was installed and I can see from the look on 588 00:14:43,730 --> 00:14:43,740 installed and I can see from the look on 589 00:14:43,740 --> 00:14:46,910 installed and I can see from the look on your face yeah well you know I hear 590 00:14:46,910 --> 00:14:46,920 your face yeah well you know I hear 591 00:14:46,920 --> 00:14:48,620 your face yeah well you know I hear about it all the time Steven yeah oh 592 00:14:48,620 --> 00:14:48,630 about it all the time Steven yeah oh 593 00:14:48,630 --> 00:14:50,990 about it all the time Steven yeah oh yeah no it says it has anti-virus yeah 594 00:14:50,990 --> 00:14:51,000 yeah no it says it has anti-virus yeah 595 00:14:51,000 --> 00:14:53,270 yeah no it says it has anti-virus yeah there no there's the logo on the desktop 596 00:14:53,270 --> 00:14:53,280 there no there's the logo on the desktop 597 00:14:53,280 --> 00:14:55,220 there no there's the logo on the desktop for the antivirus program when you click 598 00:14:55,220 --> 00:14:55,230 for the antivirus program when you click 599 00:14:55,230 --> 00:14:57,890 for the antivirus program when you click on it it's expired or it's running but 600 00:14:57,890 --> 00:14:57,900 on it it's expired or it's running but 601 00:14:57,900 --> 00:15:01,100 on it it's expired or it's running but it hasn't been updated in 12 months you 602 00:15:01,100 --> 00:15:01,110 it hasn't been updated in 12 months you 603 00:15:01,110 --> 00:15:03,440 it hasn't been updated in 12 months you need to be running a piece of security 604 00:15:03,440 --> 00:15:03,450 need to be running a piece of security 605 00:15:03,450 --> 00:15:04,850 need to be running a piece of security software which is 606 00:15:04,850 --> 00:15:04,860 software which is 607 00:15:04,860 --> 00:15:09,740 software which is constantly checking for new threats Oh a 608 00:15:09,740 --> 00:15:09,750 constantly checking for new threats Oh a 609 00:15:09,750 --> 00:15:14,180 constantly checking for new threats Oh a good piece of information which again a 610 00:15:14,180 --> 00:15:14,190 good piece of information which again a 611 00:15:14,190 --> 00:15:16,930 good piece of information which again a lot of people aren't aware of is that 612 00:15:16,930 --> 00:15:16,940 lot of people aren't aware of is that 613 00:15:16,940 --> 00:15:20,110 lot of people aren't aware of is that companies like Google and Facebook and 614 00:15:20,110 --> 00:15:20,120 companies like Google and Facebook and 615 00:15:20,120 --> 00:15:24,410 companies like Google and Facebook and the providers of browsers and Internet 616 00:15:24,410 --> 00:15:24,420 the providers of browsers and Internet 617 00:15:24,420 --> 00:15:26,810 the providers of browsers and Internet service providers and all of the 618 00:15:26,810 --> 00:15:26,820 service providers and all of the 619 00:15:26,820 --> 00:15:28,070 service providers and all of the security software companies are 620 00:15:28,070 --> 00:15:28,080 security software companies are 621 00:15:28,080 --> 00:15:30,050 security software companies are constantly sharing a vast amount of 622 00:15:30,050 --> 00:15:30,060 constantly sharing a vast amount of 623 00:15:30,060 --> 00:15:33,260 constantly sharing a vast amount of information about these emerging threats 624 00:15:33,260 --> 00:15:33,270 information about these emerging threats 625 00:15:33,270 --> 00:15:37,490 information about these emerging threats so if a criminal sets up a malicious 626 00:15:37,490 --> 00:15:37,500 so if a criminal sets up a malicious 627 00:15:37,500 --> 00:15:41,180 so if a criminal sets up a malicious website to try and trick people into 628 00:15:41,180 --> 00:15:41,190 website to try and trick people into 629 00:15:41,190 --> 00:15:43,250 website to try and trick people into getting infected with malicious code and 630 00:15:43,250 --> 00:15:43,260 getting infected with malicious code and 631 00:15:43,260 --> 00:15:45,890 getting infected with malicious code and taking over their system that is 632 00:15:45,890 --> 00:15:45,900 taking over their system that is 633 00:15:45,900 --> 00:15:48,680 taking over their system that is detected into these days often very very 634 00:15:48,680 --> 00:15:48,690 detected into these days often very very 635 00:15:48,690 --> 00:15:50,690 detected into these days often very very quickly and as soon as that first 636 00:15:50,690 --> 00:15:50,700 quickly and as soon as that first 637 00:15:50,700 --> 00:15:52,640 quickly and as soon as that first detection happens its shared around the 638 00:15:52,640 --> 00:15:52,650 detection happens its shared around the 639 00:15:52,650 --> 00:15:55,940 detection happens its shared around the world and if you're running a good piece 640 00:15:55,940 --> 00:15:55,950 world and if you're running a good piece 641 00:15:55,950 --> 00:15:59,480 world and if you're running a good piece of commercial security software it's 642 00:15:59,480 --> 00:15:59,490 of commercial security software it's 643 00:15:59,490 --> 00:16:01,750 of commercial security software it's going to get that update your browser 644 00:16:01,750 --> 00:16:01,760 going to get that update your browser 645 00:16:01,760 --> 00:16:04,010 going to get that update your browser you know all credit to you know 646 00:16:04,010 --> 00:16:04,020 you know all credit to you know 647 00:16:04,020 --> 00:16:09,920 you know all credit to you know Microsoft and and Google and Firefox the 648 00:16:09,920 --> 00:16:09,930 Microsoft and and Google and Firefox the 649 00:16:09,930 --> 00:16:13,070 Microsoft and and Google and Firefox the main browser makers are in on that so if 650 00:16:13,070 --> 00:16:13,080 main browser makers are in on that so if 651 00:16:13,080 --> 00:16:16,040 main browser makers are in on that so if if somebody discovers a new malicious 652 00:16:16,040 --> 00:16:16,050 if somebody discovers a new malicious 653 00:16:16,050 --> 00:16:19,820 if somebody discovers a new malicious address that's updated in the browser so 654 00:16:19,820 --> 00:16:19,830 address that's updated in the browser so 655 00:16:19,830 --> 00:16:23,420 address that's updated in the browser so you see these boxes come up saying you 656 00:16:23,420 --> 00:16:23,430 you see these boxes come up saying you 657 00:16:23,430 --> 00:16:26,600 you see these boxes come up saying you know don't go here yeah don't proceed oh 658 00:16:26,600 --> 00:16:26,610 know don't go here yeah don't proceed oh 659 00:16:26,610 --> 00:16:29,780 know don't go here yeah don't proceed oh ok can I proceed don't proceed when it 660 00:16:29,780 --> 00:16:29,790 ok can I proceed don't proceed when it 661 00:16:29,790 --> 00:16:35,450 ok can I proceed don't proceed when it says that yeah so being careful about 662 00:16:35,450 --> 00:16:35,460 says that yeah so being careful about 663 00:16:35,460 --> 00:16:37,190 says that yeah so being careful about what you click on in an email 664 00:16:37,190 --> 00:16:37,200 what you click on in an email 665 00:16:37,200 --> 00:16:39,980 what you click on in an email yeah yeah and making sure that when 666 00:16:39,980 --> 00:16:39,990 yeah yeah and making sure that when 667 00:16:39,990 --> 00:16:41,090 yeah yeah and making sure that when you're looking at an email it's 668 00:16:41,090 --> 00:16:41,100 you're looking at an email it's 669 00:16:41,100 --> 00:16:43,730 you're looking at an email it's legitimate or it's serving some 670 00:16:43,730 --> 00:16:43,740 legitimate or it's serving some 671 00:16:43,740 --> 00:16:46,220 legitimate or it's serving some important purpose and you know who's 672 00:16:46,220 --> 00:16:46,230 important purpose and you know who's 673 00:16:46,230 --> 00:16:50,840 important purpose and you know who's sending it listen to the things it says 674 00:16:50,840 --> 00:16:50,850 sending it listen to the things it says 675 00:16:50,850 --> 00:16:53,360 sending it listen to the things it says in your computer if your security 676 00:16:53,360 --> 00:16:53,370 in your computer if your security 677 00:16:53,370 --> 00:16:55,100 in your computer if your security software says don't go there don't go 678 00:16:55,100 --> 00:16:55,110 software says don't go there don't go 679 00:16:55,110 --> 00:16:59,690 software says don't go there don't go there it's not okay to oh I'll check it 680 00:16:59,690 --> 00:16:59,700 there it's not okay to oh I'll check it 681 00:16:59,700 --> 00:17:02,990 there it's not okay to oh I'll check it out anyway you know that alert is coming 682 00:17:02,990 --> 00:17:03,000 out anyway you know that alert is coming 683 00:17:03,000 --> 00:17:06,280 out anyway you know that alert is coming up for a reason there are very few false 684 00:17:06,280 --> 00:17:06,290 up for a reason there are very few false 685 00:17:06,290 --> 00:17:09,830 up for a reason there are very few false alerts on these systems and and you know 686 00:17:09,830 --> 00:17:09,840 alerts on these systems and and you know 687 00:17:09,840 --> 00:17:11,810 alerts on these systems and and you know you pretty much guarantee that if Google 688 00:17:11,810 --> 00:17:11,820 you pretty much guarantee that if Google 689 00:17:11,820 --> 00:17:13,880 you pretty much guarantee that if Google Chrome says don't go there 690 00:17:13,880 --> 00:17:13,890 Chrome says don't go there 691 00:17:13,890 --> 00:17:15,640 Chrome says don't go there you shouldn't go there 692 00:17:15,640 --> 00:17:15,650 you shouldn't go there 693 00:17:15,650 --> 00:17:19,510 you shouldn't go there what some people you know companies from 694 00:17:19,510 --> 00:17:19,520 what some people you know companies from 695 00:17:19,520 --> 00:17:22,600 what some people you know companies from my bank well if your banks trying to get 696 00:17:22,600 --> 00:17:22,610 my bank well if your banks trying to get 697 00:17:22,610 --> 00:17:24,990 my bank well if your banks trying to get in touch with you go to the bank website 698 00:17:24,990 --> 00:17:25,000 in touch with you go to the bank website 699 00:17:25,000 --> 00:17:28,090 in touch with you go to the bank website open a new browser window a new browser 700 00:17:28,090 --> 00:17:28,100 open a new browser window a new browser 701 00:17:28,100 --> 00:17:32,950 open a new browser window a new browser tab and manually go to the bank yeah can 702 00:17:32,950 --> 00:17:32,960 tab and manually go to the bank yeah can 703 00:17:32,960 --> 00:17:34,690 tab and manually go to the bank yeah can I just say what this is revealing some 704 00:17:34,690 --> 00:17:34,700 I just say what this is revealing some 705 00:17:34,700 --> 00:17:38,290 I just say what this is revealing some really interesting aspect of social 706 00:17:38,290 --> 00:17:38,300 really interesting aspect of social 707 00:17:38,300 --> 00:17:41,050 really interesting aspect of social engineering Steven which is when we 708 00:17:41,050 --> 00:17:41,060 engineering Steven which is when we 709 00:17:41,060 --> 00:17:44,470 engineering Steven which is when we realize as users as computer users as 710 00:17:44,470 --> 00:17:44,480 realize as users as computer users as 711 00:17:44,480 --> 00:17:46,300 realize as users as computer users as network users and users of cloud 712 00:17:46,300 --> 00:17:46,310 network users and users of cloud 713 00:17:46,310 --> 00:17:50,920 network users and users of cloud services that hackers are watching for 714 00:17:50,920 --> 00:17:50,930 services that hackers are watching for 715 00:17:50,930 --> 00:17:55,390 services that hackers are watching for the things that people are that are 716 00:17:55,390 --> 00:17:55,400 the things that people are that are 717 00:17:55,400 --> 00:17:57,190 the things that people are that are going to trick people so you're making 718 00:17:57,190 --> 00:17:57,200 going to trick people so you're making 719 00:17:57,200 --> 00:18:00,850 going to trick people so you're making me think yeah when I click on a link 720 00:18:00,850 --> 00:18:00,860 me think yeah when I click on a link 721 00:18:00,860 --> 00:18:02,860 me think yeah when I click on a link that's more information about kovat 19 722 00:18:02,860 --> 00:18:02,870 that's more information about kovat 19 723 00:18:02,870 --> 00:18:05,260 that's more information about kovat 19 I'm thinking oh well I can differ I can 724 00:18:05,260 --> 00:18:05,270 I'm thinking oh well I can differ I can 725 00:18:05,270 --> 00:18:07,720 I'm thinking oh well I can differ I can distinguish with my mind because I'm 726 00:18:07,720 --> 00:18:07,730 distinguish with my mind because I'm 727 00:18:07,730 --> 00:18:10,480 distinguish with my mind because I'm smart enough to determine whether this 728 00:18:10,480 --> 00:18:10,490 smart enough to determine whether this 729 00:18:10,490 --> 00:18:13,560 smart enough to determine whether this is fake news or if this is legitimate 730 00:18:13,560 --> 00:18:13,570 is fake news or if this is legitimate 731 00:18:13,570 --> 00:18:17,170 is fake news or if this is legitimate scientific news I feel like so I can 732 00:18:17,170 --> 00:18:17,180 scientific news I feel like so I can 733 00:18:17,180 --> 00:18:19,150 scientific news I feel like so I can make that distinction but what a hacker 734 00:18:19,150 --> 00:18:19,160 make that distinction but what a hacker 735 00:18:19,160 --> 00:18:21,160 make that distinction but what a hacker will do and what a social engineer will 736 00:18:21,160 --> 00:18:21,170 will do and what a social engineer will 737 00:18:21,170 --> 00:18:22,950 will do and what a social engineer will do is they'll use those types of 738 00:18:22,950 --> 00:18:22,960 do is they'll use those types of 739 00:18:22,960 --> 00:18:26,410 do is they'll use those types of websites to then infiltrate a system so 740 00:18:26,410 --> 00:18:26,420 websites to then infiltrate a system so 741 00:18:26,420 --> 00:18:28,270 websites to then infiltrate a system so it may look like it is supposed to be 742 00:18:28,270 --> 00:18:28,280 it may look like it is supposed to be 743 00:18:28,280 --> 00:18:29,770 it may look like it is supposed to be this and you're talking also about 744 00:18:29,770 --> 00:18:29,780 this and you're talking also about 745 00:18:29,780 --> 00:18:32,470 this and you're talking also about banking but it's a way for this malware 746 00:18:32,470 --> 00:18:32,480 banking but it's a way for this malware 747 00:18:32,480 --> 00:18:37,120 banking but it's a way for this malware to get in as well yes and in fact you 748 00:18:37,120 --> 00:18:37,130 to get in as well yes and in fact you 749 00:18:37,130 --> 00:18:40,060 to get in as well yes and in fact you know John Johns Hopkins University in 750 00:18:40,060 --> 00:18:40,070 know John Johns Hopkins University in 751 00:18:40,070 --> 00:18:43,030 know John Johns Hopkins University in America is been doing a lot of tracking 752 00:18:43,030 --> 00:18:43,040 America is been doing a lot of tracking 753 00:18:43,040 --> 00:18:46,450 America is been doing a lot of tracking and he's kind of the go-to source for a 754 00:18:46,450 --> 00:18:46,460 and he's kind of the go-to source for a 755 00:18:46,460 --> 00:18:49,690 and he's kind of the go-to source for a lot of information on covert 19 and 756 00:18:49,690 --> 00:18:49,700 lot of information on covert 19 and 757 00:18:49,700 --> 00:18:52,000 lot of information on covert 19 and early on their map I think it was of 758 00:18:52,000 --> 00:18:52,010 early on their map I think it was of 759 00:18:52,010 --> 00:18:56,500 early on their map I think it was of infections was taken over or or abused 760 00:18:56,500 --> 00:18:56,510 infections was taken over or or abused 761 00:18:56,510 --> 00:19:03,360 infections was taken over or or abused by hackers a criminal hacker - yeah so 762 00:19:03,360 --> 00:19:03,370 by hackers a criminal hacker - yeah so 763 00:19:03,370 --> 00:19:06,520 by hackers a criminal hacker - yeah so it's not just a question of is this fake 764 00:19:06,520 --> 00:19:06,530 it's not just a question of is this fake 765 00:19:06,530 --> 00:19:09,270 it's not just a question of is this fake kovat 19 information or is this 766 00:19:09,270 --> 00:19:09,280 kovat 19 information or is this 767 00:19:09,280 --> 00:19:12,730 kovat 19 information or is this legitimate information is the sort the 768 00:19:12,730 --> 00:19:12,740 legitimate information is the sort the 769 00:19:12,740 --> 00:19:15,490 legitimate information is the sort the legitimate source say and so any it 770 00:19:15,490 --> 00:19:15,500 legitimate source say and so any it 771 00:19:15,500 --> 00:19:17,560 legitimate source say and so any it could be legitimate like phishing scams 772 00:19:17,560 --> 00:19:17,570 could be legitimate like phishing scams 773 00:19:17,570 --> 00:19:20,200 could be legitimate like phishing scams it could be an exact copy a legitimate 774 00:19:20,200 --> 00:19:20,210 it could be an exact copy a legitimate 775 00:19:20,210 --> 00:19:22,390 it could be an exact copy a legitimate information so what you may see in your 776 00:19:22,390 --> 00:19:22,400 information so what you may see in your 777 00:19:22,400 --> 00:19:25,180 information so what you may see in your browser sometimes is is you've looked at 778 00:19:25,180 --> 00:19:25,190 browser sometimes is is you've looked at 779 00:19:25,190 --> 00:19:26,370 browser sometimes is is you've looked at an email 780 00:19:26,370 --> 00:19:26,380 an email 781 00:19:26,380 --> 00:19:30,060 an email it looks legit you've clicked and you've 782 00:19:30,060 --> 00:19:30,070 it looks legit you've clicked and you've 783 00:19:30,070 --> 00:19:32,039 it looks legit you've clicked and you've gone to a legitimate site that that 784 00:19:32,039 --> 00:19:32,049 gone to a legitimate site that that 785 00:19:32,049 --> 00:19:34,710 gone to a legitimate site that that sites been compromised again this 786 00:19:34,710 --> 00:19:34,720 sites been compromised again this 787 00:19:34,720 --> 00:19:37,919 sites been compromised again this background updating and sharing of 788 00:19:37,919 --> 00:19:37,929 background updating and sharing of 789 00:19:37,929 --> 00:19:40,799 background updating and sharing of malicious data of data about malicious 790 00:19:40,799 --> 00:19:40,809 malicious data of data about malicious 791 00:19:40,809 --> 00:19:45,090 malicious data of data about malicious activity will often catch that so you 792 00:19:45,090 --> 00:19:45,100 activity will often catch that so you 793 00:19:45,100 --> 00:19:46,470 activity will often catch that so you may be in a situation I think you raise 794 00:19:46,470 --> 00:19:46,480 may be in a situation I think you raise 795 00:19:46,480 --> 00:19:50,249 may be in a situation I think you raise a good point Robbie you've gone to your 796 00:19:50,249 --> 00:19:50,259 a good point Robbie you've gone to your 797 00:19:50,259 --> 00:19:54,720 a good point Robbie you've gone to your known source but that known source has 798 00:19:54,720 --> 00:19:54,730 known source but that known source has 799 00:19:54,730 --> 00:19:57,029 known source but that known source has been compromised you get a browser 800 00:19:57,029 --> 00:19:57,039 been compromised you get a browser 801 00:19:57,039 --> 00:19:59,430 been compromised you get a browser warning that says don't go there and you 802 00:19:59,430 --> 00:19:59,440 warning that says don't go there and you 803 00:19:59,440 --> 00:20:02,639 warning that says don't go there and you go but hey it's a legitimate place those 804 00:20:02,639 --> 00:20:02,649 go but hey it's a legitimate place those 805 00:20:02,649 --> 00:20:04,700 go but hey it's a legitimate place those are those are kind of transient because 806 00:20:04,700 --> 00:20:04,710 are those are kind of transient because 807 00:20:04,710 --> 00:20:07,350 are those are kind of transient because what will often happen is is the you 808 00:20:07,350 --> 00:20:07,360 what will often happen is is the you 809 00:20:07,360 --> 00:20:08,879 what will often happen is is the you know the legitimate source has been 810 00:20:08,879 --> 00:20:08,889 know the legitimate source has been 811 00:20:08,889 --> 00:20:10,860 know the legitimate source has been compromised we will find that out fairly 812 00:20:10,860 --> 00:20:10,870 compromised we will find that out fairly 813 00:20:10,870 --> 00:20:13,919 compromised we will find that out fairly quickly and rectify the problem sure and 814 00:20:13,919 --> 00:20:13,929 quickly and rectify the problem sure and 815 00:20:13,929 --> 00:20:18,210 quickly and rectify the problem sure and I think what and then this sounds really 816 00:20:18,210 --> 00:20:18,220 I think what and then this sounds really 817 00:20:18,220 --> 00:20:21,450 I think what and then this sounds really like a forever 818 00:20:21,450 --> 00:20:21,460 like a forever 819 00:20:21,460 --> 00:20:25,080 like a forever but it's not a happy thing to say but we 820 00:20:25,080 --> 00:20:25,090 but it's not a happy thing to say but we 821 00:20:25,090 --> 00:20:27,450 but it's not a happy thing to say but we can sit at home just clicking away 822 00:20:27,450 --> 00:20:27,460 can sit at home just clicking away 823 00:20:27,460 --> 00:20:29,369 can sit at home just clicking away merrily because we're at home are we you 824 00:20:29,369 --> 00:20:29,379 merrily because we're at home are we you 825 00:20:29,379 --> 00:20:31,980 merrily because we're at home are we you know we're not at working got a we got a 826 00:20:31,980 --> 00:20:31,990 know we're not at working got a we got a 827 00:20:31,990 --> 00:20:34,649 know we're not at working got a we got a pass the time somehow Stephen yes but 828 00:20:34,649 --> 00:20:34,659 pass the time somehow Stephen yes but 829 00:20:34,659 --> 00:20:37,950 pass the time somehow Stephen yes but but don't do it by you know being daring 830 00:20:37,950 --> 00:20:37,960 but don't do it by you know being daring 831 00:20:37,960 --> 00:20:40,769 but don't do it by you know being daring on where you go on the Internet yes I 832 00:20:40,769 --> 00:20:40,779 on where you go on the Internet yes I 833 00:20:40,779 --> 00:20:42,930 on where you go on the Internet yes I mean there are many studies over the 834 00:20:42,930 --> 00:20:42,940 mean there are many studies over the 835 00:20:42,940 --> 00:20:45,060 mean there are many studies over the years that show that right and I guess 836 00:20:45,060 --> 00:20:45,070 years that show that right and I guess 837 00:20:45,070 --> 00:20:49,019 years that show that right and I guess you know this would be potentially 838 00:20:49,019 --> 00:20:49,029 you know this would be potentially 839 00:20:49,029 --> 00:20:51,470 you know this would be potentially something that's not in your standard 840 00:20:51,470 --> 00:20:51,480 something that's not in your standard 841 00:20:51,480 --> 00:20:54,450 something that's not in your standard security awareness is there's a strong 842 00:20:54,450 --> 00:20:54,460 security awareness is there's a strong 843 00:20:54,460 --> 00:20:58,470 security awareness is there's a strong correlation between certain 844 00:20:58,470 --> 00:20:58,480 correlation between certain 845 00:20:58,480 --> 00:21:03,180 correlation between certain age behavior and infection of systems 846 00:21:03,180 --> 00:21:03,190 age behavior and infection of systems 847 00:21:03,190 --> 00:21:06,600 age behavior and infection of systems with malicious code right so unless we 848 00:21:06,600 --> 00:21:06,610 with malicious code right so unless we 849 00:21:06,610 --> 00:21:10,909 with malicious code right so unless we let's say adult websites now 850 00:21:10,909 --> 00:21:10,919 let's say adult websites now 851 00:21:10,919 --> 00:21:13,289 let's say adult websites now interestingly a lot of adult web sites 852 00:21:13,289 --> 00:21:13,299 interestingly a lot of adult web sites 853 00:21:13,299 --> 00:21:14,909 interestingly a lot of adult web sites are very very secure because they know 854 00:21:14,909 --> 00:21:14,919 are very very secure because they know 855 00:21:14,919 --> 00:21:18,060 are very very secure because they know that you know they're a target and they 856 00:21:18,060 --> 00:21:18,070 that you know they're a target and they 857 00:21:18,070 --> 00:21:19,560 that you know they're a target and they they want to build trust with their 858 00:21:19,560 --> 00:21:19,570 they want to build trust with their 859 00:21:19,570 --> 00:21:23,669 they want to build trust with their visitors but if you're looking for stuff 860 00:21:23,669 --> 00:21:23,679 visitors but if you're looking for stuff 861 00:21:23,679 --> 00:21:27,120 visitors but if you're looking for stuff that's free stuff that's edgy stuff 862 00:21:27,120 --> 00:21:27,130 that's free stuff that's edgy stuff 863 00:21:27,130 --> 00:21:30,650 that's free stuff that's edgy stuff that's pirated stuff that's copyright 864 00:21:30,650 --> 00:21:30,660 that's pirated stuff that's copyright 865 00:21:30,660 --> 00:21:34,830 that's pirated stuff that's copyright infringement then you are exposing 866 00:21:34,830 --> 00:21:34,840 infringement then you are exposing 867 00:21:34,840 --> 00:21:37,080 infringement then you are exposing yourself because that is some that's an 868 00:21:37,080 --> 00:21:37,090 yourself because that is some that's an 869 00:21:37,090 --> 00:21:41,310 yourself because that is some that's an area where hurt for example we've seen 870 00:21:41,310 --> 00:21:41,320 area where hurt for example we've seen 871 00:21:41,320 --> 00:21:44,730 area where hurt for example we've seen this in in Torun services in the past 872 00:21:44,730 --> 00:21:44,740 this in in Torun services in the past 873 00:21:44,740 --> 00:21:46,620 this in in Torun services in the past where people are like wow I want to 874 00:21:46,620 --> 00:21:46,630 where people are like wow I want to 875 00:21:46,630 --> 00:21:48,900 where people are like wow I want to speed in that movie it's not available 876 00:21:48,900 --> 00:21:48,910 speed in that movie it's not available 877 00:21:48,910 --> 00:21:50,940 speed in that movie it's not available yet legitimately but if the pirated 878 00:21:50,940 --> 00:21:50,950 yet legitimately but if the pirated 879 00:21:50,950 --> 00:21:52,980 yet legitimately but if the pirated version is available I'm going to get a 880 00:21:52,980 --> 00:21:52,990 version is available I'm going to get a 881 00:21:52,990 --> 00:21:57,299 version is available I'm going to get a torrent player criminals love to infect 882 00:21:57,299 --> 00:21:57,309 torrent player criminals love to infect 883 00:21:57,309 --> 00:22:01,850 torrent player criminals love to infect those I'm going to stream this file 884 00:22:01,850 --> 00:22:01,860 those I'm going to stream this file 885 00:22:01,860 --> 00:22:05,450 those I'm going to stream this file criminals like to in fact those a night 886 00:22:05,450 --> 00:22:05,460 criminals like to in fact those a night 887 00:22:05,460 --> 00:22:07,980 criminals like to in fact those a night yes in some way I saw an article 888 00:22:07,980 --> 00:22:07,990 yes in some way I saw an article 889 00:22:07,990 --> 00:22:09,840 yes in some way I saw an article recently and I'm afraid I can't credit 890 00:22:09,840 --> 00:22:09,850 recently and I'm afraid I can't credit 891 00:22:09,850 --> 00:22:11,190 recently and I'm afraid I can't credit the person who wrote it because I 892 00:22:11,190 --> 00:22:11,200 the person who wrote it because I 893 00:22:11,200 --> 00:22:13,860 the person who wrote it because I remember who it was but criminals are 894 00:22:13,860 --> 00:22:13,870 remember who it was but criminals are 895 00:22:13,870 --> 00:22:17,039 remember who it was but criminals are ace marketers they're monitoring the 896 00:22:17,039 --> 00:22:17,049 ace marketers they're monitoring the 897 00:22:17,049 --> 00:22:19,350 ace marketers they're monitoring the trends you know they're going hey you 898 00:22:19,350 --> 00:22:19,360 trends you know they're going hey you 899 00:22:19,360 --> 00:22:23,760 trends you know they're going hey you know there's a game come out recently 900 00:22:23,760 --> 00:22:23,770 know there's a game come out recently 901 00:22:23,770 --> 00:22:32,580 know there's a game come out recently about crossing the road right Animal 902 00:22:32,580 --> 00:22:32,590 about crossing the road right Animal 903 00:22:32,590 --> 00:22:34,919 about crossing the road right Animal Crossing I think the kids call it animal 904 00:22:34,919 --> 00:22:34,929 Crossing I think the kids call it animal 905 00:22:34,929 --> 00:22:36,539 Crossing I think the kids call it animal crossing is that right my right kids 906 00:22:36,539 --> 00:22:36,549 crossing is that right my right kids 907 00:22:36,549 --> 00:22:41,610 crossing is that right my right kids yeah so you know tips on how to win on 908 00:22:41,610 --> 00:22:41,620 yeah so you know tips on how to win on 909 00:22:41,620 --> 00:22:45,720 yeah so you know tips on how to win on that if you google that there will be an 910 00:22:45,720 --> 00:22:45,730 that if you google that there will be an 911 00:22:45,730 --> 00:22:49,760 that if you google that there will be an attempt going on I can bet I bet that 912 00:22:49,760 --> 00:22:49,770 attempt going on I can bet I bet that 913 00:22:49,770 --> 00:22:51,570 attempt going on I can bet I bet that the 914 00:22:51,570 --> 00:22:51,580 the 915 00:22:51,580 --> 00:22:53,670 the the strategy of what's called search 916 00:22:53,670 --> 00:22:53,680 the strategy of what's called search 917 00:22:53,680 --> 00:22:57,510 the strategy of what's called search poisoning is going on where criminals 918 00:22:57,510 --> 00:22:57,520 poisoning is going on where criminals 919 00:22:57,520 --> 00:23:03,360 poisoning is going on where criminals will use various methods to get their 920 00:23:03,360 --> 00:23:03,370 will use various methods to get their 921 00:23:03,370 --> 00:23:05,520 will use various methods to get their search results for their site that they 922 00:23:05,520 --> 00:23:05,530 search results for their site that they 923 00:23:05,530 --> 00:23:10,050 search results for their site that they control into the top search results 924 00:23:10,050 --> 00:23:10,060 control into the top search results 925 00:23:10,060 --> 00:23:13,460 control into the top search results this isn't Kovac 19 related but of a oh 926 00:23:13,460 --> 00:23:13,470 this isn't Kovac 19 related but of a oh 927 00:23:13,470 --> 00:23:15,780 this isn't Kovac 19 related but of a oh I don't know three or four months ago I 928 00:23:15,780 --> 00:23:15,790 I don't know three or four months ago I 929 00:23:15,790 --> 00:23:20,780 I don't know three or four months ago I was looking for a map of the world and 930 00:23:20,780 --> 00:23:20,790 was looking for a map of the world and 931 00:23:20,790 --> 00:23:23,850 was looking for a map of the world and right in the top 10 search results for 932 00:23:23,850 --> 00:23:23,860 right in the top 10 search results for 933 00:23:23,860 --> 00:23:27,450 right in the top 10 search results for our you know map of the world was an 934 00:23:27,450 --> 00:23:27,460 our you know map of the world was an 935 00:23:27,460 --> 00:23:33,720 our you know map of the world was an infected site and there's some bears and 936 00:23:33,720 --> 00:23:33,730 infected site and there's some bears and 937 00:23:33,730 --> 00:23:34,950 infected site and there's some bears and sometimes when I say there's somebody 938 00:23:34,950 --> 00:23:34,960 sometimes when I say there's somebody 939 00:23:34,960 --> 00:23:36,500 sometimes when I say there's somebody doing something I actually mean an 940 00:23:36,500 --> 00:23:36,510 doing something I actually mean an 941 00:23:36,510 --> 00:23:38,760 doing something I actually mean an algorithm is doing something but there 942 00:23:38,760 --> 00:23:38,770 algorithm is doing something but there 943 00:23:38,770 --> 00:23:41,070 algorithm is doing something but there are algorithms which look for the most 944 00:23:41,070 --> 00:23:41,080 are algorithms which look for the most 945 00:23:41,080 --> 00:23:44,940 are algorithms which look for the most popular search topics marketing people 946 00:23:44,940 --> 00:23:44,950 popular search topics marketing people 947 00:23:44,950 --> 00:23:47,400 popular search topics marketing people use those for legitimate purposes but 948 00:23:47,400 --> 00:23:47,410 use those for legitimate purposes but 949 00:23:47,410 --> 00:23:50,910 use those for legitimate purposes but then criminals use those to find what 950 00:23:50,910 --> 00:23:50,920 then criminals use those to find what 951 00:23:50,920 --> 00:23:54,120 then criminals use those to find what people are looking for and you know when 952 00:23:54,120 --> 00:23:54,130 people are looking for and you know when 953 00:23:54,130 --> 00:23:57,390 people are looking for and you know when when a particular singer becomes popular 954 00:23:57,390 --> 00:23:57,400 when a particular singer becomes popular 955 00:23:57,400 --> 00:24:01,280 when a particular singer becomes popular or a particular actress becomes popular 956 00:24:01,280 --> 00:24:01,290 or a particular actress becomes popular 957 00:24:01,290 --> 00:24:04,110 or a particular actress becomes popular search results for pictures of them are 958 00:24:04,110 --> 00:24:04,120 search results for pictures of them are 959 00:24:04,120 --> 00:24:09,600 search results for pictures of them are a great way for criminals to get you to 960 00:24:09,600 --> 00:24:09,610 a great way for criminals to get you to 961 00:24:09,610 --> 00:24:12,270 a great way for criminals to get you to click on something that they control hmm 962 00:24:12,270 --> 00:24:12,280 click on something that they control hmm 963 00:24:12,280 --> 00:24:15,090 click on something that they control hmm so let's take what we've learned here in 964 00:24:15,090 --> 00:24:15,100 so let's take what we've learned here in 965 00:24:15,100 --> 00:24:18,290 so let's take what we've learned here in summary and bring it together into 966 00:24:18,290 --> 00:24:18,300 summary and bring it together into 967 00:24:18,300 --> 00:24:20,790 summary and bring it together into something that's very relevant for our 968 00:24:20,790 --> 00:24:20,800 something that's very relevant for our 969 00:24:20,800 --> 00:24:23,010 something that's very relevant for our small businesses for the medium-sized 970 00:24:23,010 --> 00:24:23,020 small businesses for the medium-sized 971 00:24:23,020 --> 00:24:24,990 small businesses for the medium-sized business that's being impacted by 972 00:24:24,990 --> 00:24:25,000 business that's being impacted by 973 00:24:25,000 --> 00:24:26,190 business that's being impacted by everything that's going on in our world 974 00:24:26,190 --> 00:24:26,200 everything that's going on in our world 975 00:24:26,200 --> 00:24:30,750 everything that's going on in our world today we've learned that hackers are 976 00:24:30,750 --> 00:24:30,760 today we've learned that hackers are 977 00:24:30,760 --> 00:24:31,520 today we've learned that hackers are smart 978 00:24:31,520 --> 00:24:31,530 smart 979 00:24:31,530 --> 00:24:34,380 smart hackers are let's let's make a 980 00:24:34,380 --> 00:24:34,390 hackers are let's let's make a 981 00:24:34,390 --> 00:24:36,720 hackers are let's let's make a distinction that we're talking criminal 982 00:24:36,720 --> 00:24:36,730 distinction that we're talking criminal 983 00:24:36,730 --> 00:24:39,150 distinction that we're talking criminal hackers because we don't need implicate 984 00:24:39,150 --> 00:24:39,160 hackers because we don't need implicate 985 00:24:39,160 --> 00:24:40,560 hackers because we don't need implicate the people who are hacking for good 986 00:24:40,560 --> 00:24:40,570 the people who are hacking for good 987 00:24:40,570 --> 00:24:43,320 the people who are hacking for good right sure yes so maybe that's a 988 00:24:43,320 --> 00:24:43,330 right sure yes so maybe that's a 989 00:24:43,330 --> 00:24:45,180 right sure yes so maybe that's a generalized term at this point so 990 00:24:45,180 --> 00:24:45,190 generalized term at this point so 991 00:24:45,190 --> 00:24:47,970 generalized term at this point so criminal hackers are smart they are 992 00:24:47,970 --> 00:24:47,980 criminal hackers are smart they are 993 00:24:47,980 --> 00:24:50,610 criminal hackers are smart they are intelligent they are good at social 994 00:24:50,610 --> 00:24:50,620 intelligent they are good at social 995 00:24:50,620 --> 00:24:53,820 intelligent they are good at social engineering which means basically they 996 00:24:53,820 --> 00:24:53,830 engineering which means basically they 997 00:24:53,830 --> 00:24:55,710 engineering which means basically they monitor those trends they understand 998 00:24:55,710 --> 00:24:55,720 monitor those trends they understand 999 00:24:55,720 --> 00:24:57,690 monitor those trends they understand what kinds of things we're thinking 1000 00:24:57,690 --> 00:24:57,700 what kinds of things we're thinking 1001 00:24:57,700 --> 00:24:59,220 what kinds of things we're thinking about and what kinds of things we're 1002 00:24:59,220 --> 00:24:59,230 about and what kinds of things we're 1003 00:24:59,230 --> 00:25:01,410 about and what kinds of things we're looking for so putting that into 1004 00:25:01,410 --> 00:25:01,420 looking for so putting that into 1005 00:25:01,420 --> 00:25:04,050 looking for so putting that into perspective here as Steven you use the 1006 00:25:04,050 --> 00:25:04,060 perspective here as Steven you use the 1007 00:25:04,060 --> 00:25:04,950 perspective here as Steven you use the example of the 1008 00:25:04,950 --> 00:25:04,960 example of the 1009 00:25:04,960 --> 00:25:06,990 example of the BitTorrent downloads and maybe trying to 1010 00:25:06,990 --> 00:25:07,000 BitTorrent downloads and maybe trying to 1011 00:25:07,000 --> 00:25:09,000 BitTorrent downloads and maybe trying to find illegal copies of movies and things 1012 00:25:09,000 --> 00:25:09,010 find illegal copies of movies and things 1013 00:25:09,010 --> 00:25:11,430 find illegal copies of movies and things but maybe I'm not a lawbreaker maybe I'm 1014 00:25:11,430 --> 00:25:11,440 but maybe I'm not a lawbreaker maybe I'm 1015 00:25:11,440 --> 00:25:13,710 but maybe I'm not a lawbreaker maybe I'm not looking for those illegal things but 1016 00:25:13,710 --> 00:25:13,720 not looking for those illegal things but 1017 00:25:13,720 --> 00:25:14,970 not looking for those illegal things but I'll tell you what I am looking for 1018 00:25:14,970 --> 00:25:14,980 I'll tell you what I am looking for 1019 00:25:14,980 --> 00:25:17,310 I'll tell you what I am looking for right now my google search is going to 1020 00:25:17,310 --> 00:25:17,320 right now my google search is going to 1021 00:25:17,320 --> 00:25:20,760 right now my google search is going to be for things like for example free 1022 00:25:20,760 --> 00:25:20,770 be for things like for example free 1023 00:25:20,770 --> 00:25:24,320 be for things like for example free remote desktop free work from home 1024 00:25:24,320 --> 00:25:24,330 remote desktop free work from home 1025 00:25:24,330 --> 00:25:27,649 remote desktop free work from home software and the social engineer 1026 00:25:27,649 --> 00:25:27,659 software and the social engineer 1027 00:25:27,659 --> 00:25:30,630 software and the social engineer criminal hacker is watching for those 1028 00:25:30,630 --> 00:25:30,640 criminal hacker is watching for those 1029 00:25:30,640 --> 00:25:32,940 criminal hacker is watching for those kinds of trends and saying there's an 1030 00:25:32,940 --> 00:25:32,950 kinds of trends and saying there's an 1031 00:25:32,950 --> 00:25:35,970 kinds of trends and saying there's an opportunity for me to provide some free 1032 00:25:35,970 --> 00:25:35,980 opportunity for me to provide some free 1033 00:25:35,980 --> 00:25:38,549 opportunity for me to provide some free software right once that gets into your 1034 00:25:38,549 --> 00:25:38,559 software right once that gets into your 1035 00:25:38,559 --> 00:25:40,950 software right once that gets into your system I mean right now we're not we're 1036 00:25:40,950 --> 00:25:40,960 system I mean right now we're not we're 1037 00:25:40,960 --> 00:25:43,080 system I mean right now we're not we're working from home our computers at the 1038 00:25:43,080 --> 00:25:43,090 working from home our computers at the 1039 00:25:43,090 --> 00:25:46,940 working from home our computers at the office in our business are basically 1040 00:25:46,940 --> 00:25:46,950 office in our business are basically 1041 00:25:46,950 --> 00:25:51,240 office in our business are basically free for all for outside attack so I 1042 00:25:51,240 --> 00:25:51,250 free for all for outside attack so I 1043 00:25:51,250 --> 00:25:53,730 free for all for outside attack so I have one customer in particular who I'm 1044 00:25:53,730 --> 00:25:53,740 have one customer in particular who I'm 1045 00:25:53,740 --> 00:25:55,769 have one customer in particular who I'm thinking of who called me up and said oh 1046 00:25:55,769 --> 00:25:55,779 thinking of who called me up and said oh 1047 00:25:55,779 --> 00:25:57,750 thinking of who called me up and said oh I've got work from home settled because 1048 00:25:57,750 --> 00:25:57,760 I've got work from home settled because 1049 00:25:57,760 --> 00:26:00,659 I've got work from home settled because I installed VNC on my computer and I 1050 00:26:00,659 --> 00:26:00,669 I installed VNC on my computer and I 1051 00:26:00,669 --> 00:26:04,500 I installed VNC on my computer and I open the port in the firewall right so 1052 00:26:04,500 --> 00:26:04,510 open the port in the firewall right so 1053 00:26:04,510 --> 00:26:07,769 open the port in the firewall right so now that computer is accessible from 1054 00:26:07,769 --> 00:26:07,779 now that computer is accessible from 1055 00:26:07,779 --> 00:26:12,149 now that computer is accessible from anywhere in the world by anyone if you 1056 00:26:12,149 --> 00:26:12,159 anywhere in the world by anyone if you 1057 00:26:12,159 --> 00:26:15,810 anywhere in the world by anyone if you need to it's not done properly yes and I 1058 00:26:15,810 --> 00:26:15,820 need to it's not done properly yes and I 1059 00:26:15,820 --> 00:26:19,440 need to it's not done properly yes and I think the point here is that if your 1060 00:26:19,440 --> 00:26:19,450 think the point here is that if your 1061 00:26:19,450 --> 00:26:21,930 think the point here is that if your company hasn't or your organization's 1062 00:26:21,930 --> 00:26:21,940 company hasn't or your organization's 1063 00:26:21,940 --> 00:26:26,960 company hasn't or your organization's hasn't supported working from home 1064 00:26:26,960 --> 00:26:26,970 hasn't supported working from home 1065 00:26:26,970 --> 00:26:29,880 hasn't supported working from home before and you're just setting it up now 1066 00:26:29,880 --> 00:26:29,890 before and you're just setting it up now 1067 00:26:29,890 --> 00:26:32,510 before and you're just setting it up now you need to get professional advice 1068 00:26:32,510 --> 00:26:32,520 you need to get professional advice 1069 00:26:32,520 --> 00:26:35,490 you need to get professional advice that's going to be you know that's 1070 00:26:35,490 --> 00:26:35,500 that's going to be you know that's 1071 00:26:35,500 --> 00:26:37,169 that's going to be you know that's possibly going to be on the phone or 1072 00:26:37,169 --> 00:26:37,179 possibly going to be on the phone or 1073 00:26:37,179 --> 00:26:40,110 possibly going to be on the phone or online not in person but there you you 1074 00:26:40,110 --> 00:26:40,120 online not in person but there you you 1075 00:26:40,120 --> 00:26:44,370 online not in person but there you you want to get this done properly I'll 1076 00:26:44,370 --> 00:26:44,380 want to get this done properly I'll 1077 00:26:44,380 --> 00:26:46,889 want to get this done properly I'll share a statistic with you kind of a 1078 00:26:46,889 --> 00:26:46,899 share a statistic with you kind of a 1079 00:26:46,899 --> 00:26:51,210 share a statistic with you kind of a fresh statistic I happen to think about 1080 00:26:51,210 --> 00:26:51,220 fresh statistic I happen to think about 1081 00:26:51,220 --> 00:26:53,820 fresh statistic I happen to think about this problem back in the beginning of ma 1082 00:26:53,820 --> 00:26:53,830 this problem back in the beginning of ma 1083 00:26:53,830 --> 00:26:58,470 this problem back in the beginning of ma of the month our DP we met Remote 1084 00:26:58,470 --> 00:26:58,480 of the month our DP we met Remote 1085 00:26:58,480 --> 00:27:01,019 of the month our DP we met Remote Desktop Protocol as you know is one of 1086 00:27:01,019 --> 00:27:01,029 Desktop Protocol as you know is one of 1087 00:27:01,029 --> 00:27:03,000 Desktop Protocol as you know is one of the ways in which remote access is 1088 00:27:03,000 --> 00:27:03,010 the ways in which remote access is 1089 00:27:03,010 --> 00:27:06,990 the ways in which remote access is enabled to systems and I studied this in 1090 00:27:06,990 --> 00:27:07,000 enabled to systems and I studied this in 1091 00:27:07,000 --> 00:27:10,409 enabled to systems and I studied this in the past and I would refer people if you 1092 00:27:10,409 --> 00:27:10,419 the past and I would refer people if you 1093 00:27:10,419 --> 00:27:13,590 the past and I would refer people if you don't mind - we live security comm which 1094 00:27:13,590 --> 00:27:13,600 don't mind - we live security comm which 1095 00:27:13,600 --> 00:27:16,080 don't mind - we live security comm which is a great website with security 1096 00:27:16,080 --> 00:27:16,090 is a great website with security 1097 00:27:16,090 --> 00:27:18,630 is a great website with security information just use their search 1098 00:27:18,630 --> 00:27:18,640 information just use their search 1099 00:27:18,640 --> 00:27:21,630 information just use their search our DP because this is widely use 1100 00:27:21,630 --> 00:27:21,640 our DP because this is widely use 1101 00:27:21,640 --> 00:27:25,580 our DP because this is widely use protocol which is often used in securely 1102 00:27:25,580 --> 00:27:25,590 protocol which is often used in securely 1103 00:27:25,590 --> 00:27:30,690 protocol which is often used in securely so one of the clues is that if you set 1104 00:27:30,690 --> 00:27:30,700 so one of the clues is that if you set 1105 00:27:30,700 --> 00:27:34,200 so one of the clues is that if you set it up and you can be seen by other 1106 00:27:34,200 --> 00:27:34,210 it up and you can be seen by other 1107 00:27:34,210 --> 00:27:37,230 it up and you can be seen by other people to be running that that if it's 1108 00:27:37,230 --> 00:27:37,240 people to be running that that if it's 1109 00:27:37,240 --> 00:27:41,280 people to be running that that if it's clear that you've got the default port 1110 00:27:41,280 --> 00:27:41,290 clear that you've got the default port 1111 00:27:41,290 --> 00:27:44,910 clear that you've got the default port for that open on your systems you're 1112 00:27:44,910 --> 00:27:44,920 for that open on your systems you're 1113 00:27:44,920 --> 00:27:47,190 for that open on your systems you're probably you possibly haven't done it 1114 00:27:47,190 --> 00:27:47,200 probably you possibly haven't done it 1115 00:27:47,200 --> 00:27:49,710 probably you possibly haven't done it right not not every visible port is 1116 00:27:49,710 --> 00:27:49,720 right not not every visible port is 1117 00:27:49,720 --> 00:27:53,669 right not not every visible port is insecure but I thought okay let me just 1118 00:27:53,669 --> 00:27:53,679 insecure but I thought okay let me just 1119 00:27:53,679 --> 00:27:57,360 insecure but I thought okay let me just see how he's not running RDP I'm right 1120 00:27:57,360 --> 00:27:57,370 see how he's not running RDP I'm right 1121 00:27:57,370 --> 00:28:00,360 see how he's not running RDP I'm right use a tool legitimate legal tool to do 1122 00:28:00,360 --> 00:28:00,370 use a tool legitimate legal tool to do 1123 00:28:00,370 --> 00:28:03,930 use a tool legitimate legal tool to do this because every very basic piece of 1124 00:28:03,930 --> 00:28:03,940 this because every very basic piece of 1125 00:28:03,940 --> 00:28:05,700 this because every very basic piece of information is every computer on the 1126 00:28:05,700 --> 00:28:05,710 information is every computer on the 1127 00:28:05,710 --> 00:28:07,590 information is every computer on the internets visible to the Internet in 1128 00:28:07,590 --> 00:28:07,600 internets visible to the Internet in 1129 00:28:07,600 --> 00:28:10,740 internets visible to the Internet in some way and there's scanners which look 1130 00:28:10,740 --> 00:28:10,750 some way and there's scanners which look 1131 00:28:10,750 --> 00:28:14,400 some way and there's scanners which look for that March 6 there were three 1132 00:28:14,400 --> 00:28:14,410 for that March 6 there were three 1133 00:28:14,410 --> 00:28:18,570 for that March 6 there were three million systems where the default port 1134 00:28:18,570 --> 00:28:18,580 million systems where the default port 1135 00:28:18,580 --> 00:28:22,710 million systems where the default port for RDP was was visible right I checked 1136 00:28:22,710 --> 00:28:22,720 for RDP was was visible right I checked 1137 00:28:22,720 --> 00:28:26,940 for RDP was was visible right I checked before our conversation four million 1138 00:28:26,940 --> 00:28:26,950 before our conversation four million 1139 00:28:26,950 --> 00:28:29,490 before our conversation four million two hundred and forty thousand so people 1140 00:28:29,490 --> 00:28:29,500 two hundred and forty thousand so people 1141 00:28:29,500 --> 00:28:31,409 two hundred and forty thousand so people are turning on remote desktop in order 1142 00:28:31,409 --> 00:28:31,419 are turning on remote desktop in order 1143 00:28:31,419 --> 00:28:32,850 are turning on remote desktop in order to be able to access their computers 1144 00:28:32,850 --> 00:28:32,860 to be able to access their computers 1145 00:28:32,860 --> 00:28:36,780 to be able to access their computers from home right so so we've seen a 40 1146 00:28:36,780 --> 00:28:36,790 from home right so so we've seen a 40 1147 00:28:36,790 --> 00:28:38,970 from home right so so we've seen a 40 percent increase in the number of 1148 00:28:38,970 --> 00:28:38,980 percent increase in the number of 1149 00:28:38,980 --> 00:28:41,970 percent increase in the number of visible systems running the default port 1150 00:28:41,970 --> 00:28:41,980 visible systems running the default port 1151 00:28:41,980 --> 00:28:45,510 visible systems running the default port for for this and and I want to be clear 1152 00:28:45,510 --> 00:28:45,520 for for this and and I want to be clear 1153 00:28:45,520 --> 00:28:49,260 for for this and and I want to be clear they're not all insecure but my chances 1154 00:28:49,260 --> 00:28:49,270 they're not all insecure but my chances 1155 00:28:49,270 --> 00:28:51,120 they're not all insecure but my chances as a criminal the finding room that's 1156 00:28:51,120 --> 00:28:51,130 as a criminal the finding room that's 1157 00:28:51,130 --> 00:28:53,400 as a criminal the finding room that's insecure have just gone way way up I've 1158 00:28:53,400 --> 00:28:53,410 insecure have just gone way way up I've 1159 00:28:53,410 --> 00:28:55,680 insecure have just gone way way up I've got a 40 percent better chance then and 1160 00:28:55,680 --> 00:28:55,690 got a 40 percent better chance then and 1161 00:28:55,690 --> 00:28:58,110 got a 40 percent better chance then and from my own work I know that you know 1162 00:28:58,110 --> 00:28:58,120 from my own work I know that you know 1163 00:28:58,120 --> 00:29:01,950 from my own work I know that you know even when there were just a million you 1164 00:29:01,950 --> 00:29:01,960 even when there were just a million you 1165 00:29:01,960 --> 00:29:06,570 even when there were just a million you could very quickly find one or two in a 1166 00:29:06,570 --> 00:29:06,580 could very quickly find one or two in a 1167 00:29:06,580 --> 00:29:08,880 could very quickly find one or two in a particular area and this is all 1168 00:29:08,880 --> 00:29:08,890 particular area and this is all 1169 00:29:08,890 --> 00:29:11,640 particular area and this is all geographically located too so you know 1170 00:29:11,640 --> 00:29:11,650 geographically located too so you know 1171 00:29:11,650 --> 00:29:13,950 geographically located too so you know if you were a criminal targeting people 1172 00:29:13,950 --> 00:29:13,960 if you were a criminal targeting people 1173 00:29:13,960 --> 00:29:16,799 if you were a criminal targeting people in Philadelphia you can find who's got 1174 00:29:16,799 --> 00:29:16,809 in Philadelphia you can find who's got 1175 00:29:16,809 --> 00:29:21,120 in Philadelphia you can find who's got their port open in Philadelphia and if I 1176 00:29:21,120 --> 00:29:21,130 their port open in Philadelphia and if I 1177 00:29:21,130 --> 00:29:23,970 their port open in Philadelphia and if I can say and if I can say Steven my 1178 00:29:23,970 --> 00:29:23,980 can say and if I can say Steven my 1179 00:29:23,980 --> 00:29:26,850 can say and if I can say Steven my concern with remote desktop is that an 1180 00:29:26,850 --> 00:29:26,860 concern with remote desktop is that an 1181 00:29:26,860 --> 00:29:28,650 concern with remote desktop is that an RDP being the protocol so on your 1182 00:29:28,650 --> 00:29:28,660 RDP being the protocol so on your 1183 00:29:28,660 --> 00:29:30,150 RDP being the protocol so on your Windows machine turning on remote 1184 00:29:30,150 --> 00:29:30,160 Windows machine turning on remote 1185 00:29:30,160 --> 00:29:31,770 Windows machine turning on remote desktop but is simply the fact that 1186 00:29:31,770 --> 00:29:31,780 desktop but is simply the fact that 1187 00:29:31,780 --> 00:29:32,400 desktop but is simply the fact that somebody 1188 00:29:32,400 --> 00:29:32,410 somebody 1189 00:29:32,410 --> 00:29:34,440 somebody be brute-forcing your password and you'd 1190 00:29:34,440 --> 00:29:34,450 be brute-forcing your password and you'd 1191 00:29:34,450 --> 00:29:36,540 be brute-forcing your password and you'd be none you.your none the wiser so 1192 00:29:36,540 --> 00:29:36,550 be none you.your none the wiser so 1193 00:29:36,550 --> 00:29:39,240 be none you.your none the wiser so eventually they get in and because 1194 00:29:39,240 --> 00:29:39,250 eventually they get in and because 1195 00:29:39,250 --> 00:29:41,550 eventually they get in and because you're working from home you don't even 1196 00:29:41,550 --> 00:29:41,560 you're working from home you don't even 1197 00:29:41,560 --> 00:29:43,170 you're working from home you don't even realize that they're accessing your 1198 00:29:43,170 --> 00:29:43,180 realize that they're accessing your 1199 00:29:43,180 --> 00:29:45,680 realize that they're accessing your system can I suggest that without 1200 00:29:45,680 --> 00:29:45,690 system can I suggest that without 1201 00:29:45,690 --> 00:29:48,210 system can I suggest that without two-factor authentication we should not 1202 00:29:48,210 --> 00:29:48,220 two-factor authentication we should not 1203 00:29:48,220 --> 00:29:53,790 two-factor authentication we should not consider any work from home safe and 1204 00:29:53,790 --> 00:29:53,800 consider any work from home safe and 1205 00:29:53,800 --> 00:29:55,400 consider any work from home safe and this comes back to your previous point 1206 00:29:55,400 --> 00:29:55,410 this comes back to your previous point 1207 00:29:55,410 --> 00:29:57,450 this comes back to your previous point you're setting this if you're setting 1208 00:29:57,450 --> 00:29:57,460 you're setting this if you're setting 1209 00:29:57,460 --> 00:29:59,970 you're setting this if you're setting remote access of it whatever software 1210 00:29:59,970 --> 00:29:59,980 remote access of it whatever software 1211 00:29:59,980 --> 00:30:00,900 remote access of it whatever software you're using 1212 00:30:00,900 --> 00:30:00,910 you're using 1213 00:30:00,910 --> 00:30:03,570 you're using first of all it needs to be legitimate 1214 00:30:03,570 --> 00:30:03,580 first of all it needs to be legitimate 1215 00:30:03,580 --> 00:30:06,420 first of all it needs to be legitimate software and some operating systems come 1216 00:30:06,420 --> 00:30:06,430 software and some operating systems come 1217 00:30:06,430 --> 00:30:10,190 software and some operating systems come with legitimate built-in tools there are 1218 00:30:10,190 --> 00:30:10,200 with legitimate built-in tools there are 1219 00:30:10,200 --> 00:30:12,720 with legitimate built-in tools there are products that you can purchase but it 1220 00:30:12,720 --> 00:30:12,730 products that you can purchase but it 1221 00:30:12,730 --> 00:30:14,880 products that you can purchase but it needs to be legitimate and it needs to 1222 00:30:14,880 --> 00:30:14,890 needs to be legitimate and it needs to 1223 00:30:14,890 --> 00:30:16,680 needs to be legitimate and it needs to be installed properly and installed 1224 00:30:16,680 --> 00:30:16,690 be installed properly and installed 1225 00:30:16,690 --> 00:30:20,550 be installed properly and installed securely and that means more than a 1226 00:30:20,550 --> 00:30:20,560 securely and that means more than a 1227 00:30:20,560 --> 00:30:23,340 securely and that means more than a password to protect it now you could do 1228 00:30:23,340 --> 00:30:23,350 password to protect it now you could do 1229 00:30:23,350 --> 00:30:25,680 password to protect it now you could do things like limit the number of times 1230 00:30:25,680 --> 00:30:25,690 things like limit the number of times 1231 00:30:25,690 --> 00:30:28,920 things like limit the number of times somebody can try bad password but you 1232 00:30:28,920 --> 00:30:28,930 somebody can try bad password but you 1233 00:30:28,930 --> 00:30:31,500 somebody can try bad password but you really shouldn't have a password based 1234 00:30:31,500 --> 00:30:31,510 really shouldn't have a password based 1235 00:30:31,510 --> 00:30:35,040 really shouldn't have a password based authentication remote access system you 1236 00:30:35,040 --> 00:30:35,050 authentication remote access system you 1237 00:30:35,050 --> 00:30:37,730 authentication remote access system you should be using something that's 1238 00:30:37,730 --> 00:30:37,740 should be using something that's 1239 00:30:37,740 --> 00:30:40,260 should be using something that's two-factor and by that we mean roaming 1240 00:30:40,260 --> 00:30:40,270 two-factor and by that we mean roaming 1241 00:30:40,270 --> 00:30:42,120 two-factor and by that we mean roaming we mean something which generates a code 1242 00:30:42,120 --> 00:30:42,130 we mean something which generates a code 1243 00:30:42,130 --> 00:30:44,910 we mean something which generates a code that you put in to access and it's 1244 00:30:44,910 --> 00:30:44,920 that you put in to access and it's 1245 00:30:44,920 --> 00:30:47,730 that you put in to access and it's something you have that the criminal 1246 00:30:47,730 --> 00:30:47,740 something you have that the criminal 1247 00:30:47,740 --> 00:30:49,020 something you have that the criminal can't and I don't have a lot of people 1248 00:30:49,020 --> 00:30:49,030 can't and I don't have a lot of people 1249 00:30:49,030 --> 00:30:51,450 can't and I don't have a lot of people are familiar fortunately through things 1250 00:30:51,450 --> 00:30:51,460 are familiar fortunately through things 1251 00:30:51,460 --> 00:30:54,780 are familiar fortunately through things like Facebook and other sites turning on 1252 00:30:54,780 --> 00:30:54,790 like Facebook and other sites turning on 1253 00:30:54,790 --> 00:30:56,730 like Facebook and other sites turning on two-factor authentication people know 1254 00:30:56,730 --> 00:30:56,740 two-factor authentication people know 1255 00:30:56,740 --> 00:30:58,850 two-factor authentication people know what it means they know it's important 1256 00:30:58,850 --> 00:30:58,860 what it means they know it's important 1257 00:30:58,860 --> 00:31:02,190 what it means they know it's important you get a code on your phone and that's 1258 00:31:02,190 --> 00:31:02,200 you get a code on your phone and that's 1259 00:31:02,200 --> 00:31:04,260 you get a code on your phone and that's something which a criminal can't do 1260 00:31:04,260 --> 00:31:04,270 something which a criminal can't do 1261 00:31:04,270 --> 00:31:06,840 something which a criminal can't do unless they've got your phone and sorry 1262 00:31:06,840 --> 00:31:06,850 unless they've got your phone and sorry 1263 00:31:06,850 --> 00:31:10,740 unless they've got your phone and sorry there are ways to secure this but and 1264 00:31:10,740 --> 00:31:10,750 there are ways to secure this but and 1265 00:31:10,750 --> 00:31:14,150 there are ways to secure this but and you you you you can do remote access 1266 00:31:14,150 --> 00:31:14,160 you you you you can do remote access 1267 00:31:14,160 --> 00:31:17,970 you you you you can do remote access securely but you you need to have it 1268 00:31:17,970 --> 00:31:17,980 securely but you you need to have it 1269 00:31:17,980 --> 00:31:20,010 securely but you you need to have it configured correctly and the person 1270 00:31:20,010 --> 00:31:20,020 configured correctly and the person 1271 00:31:20,020 --> 00:31:23,010 configured correctly and the person who's using it needs to know the things 1272 00:31:23,010 --> 00:31:23,020 who's using it needs to know the things 1273 00:31:23,020 --> 00:31:24,480 who's using it needs to know the things that they shouldn't shouldn't do while 1274 00:31:24,480 --> 00:31:24,490 that they shouldn't shouldn't do while 1275 00:31:24,490 --> 00:31:26,670 that they shouldn't shouldn't do while they're using that system which has that 1276 00:31:26,670 --> 00:31:26,680 they're using that system which has that 1277 00:31:26,680 --> 00:31:30,450 they're using that system which has that capability right and you mentioned just 1278 00:31:30,450 --> 00:31:30,460 capability right and you mentioned just 1279 00:31:30,460 --> 00:31:33,570 capability right and you mentioned just the fact that and I and I alluded to the 1280 00:31:33,570 --> 00:31:33,580 the fact that and I and I alluded to the 1281 00:31:33,580 --> 00:31:35,670 the fact that and I and I alluded to the fact that we're not all tech savvy so I 1282 00:31:35,670 --> 00:31:35,680 fact that we're not all tech savvy so I 1283 00:31:35,680 --> 00:31:37,410 fact that we're not all tech savvy so I may not know how to set it up securely 1284 00:31:37,410 --> 00:31:37,420 may not know how to set it up securely 1285 00:31:37,420 --> 00:31:39,360 may not know how to set it up securely because I don't you know I I do but 1286 00:31:39,360 --> 00:31:39,370 because I don't you know I I do but 1287 00:31:39,370 --> 00:31:40,830 because I don't you know I I do but maybe you're thinking to yourself I 1288 00:31:40,830 --> 00:31:40,840 maybe you're thinking to yourself I 1289 00:31:40,840 --> 00:31:42,750 maybe you're thinking to yourself I don't know how to do that and Stephen 1290 00:31:42,750 --> 00:31:42,760 don't know how to do that and Stephen 1291 00:31:42,760 --> 00:31:44,670 don't know how to do that and Stephen you mentioned that maybe we should call 1292 00:31:44,670 --> 00:31:44,680 you mentioned that maybe we should call 1293 00:31:44,680 --> 00:31:45,660 you mentioned that maybe we should call some profession 1294 00:31:45,660 --> 00:31:45,670 some profession 1295 00:31:45,670 --> 00:31:48,000 some profession to help us with that and I think that 1296 00:31:48,000 --> 00:31:48,010 to help us with that and I think that 1297 00:31:48,010 --> 00:31:49,320 to help us with that and I think that you know you say well I don't know who 1298 00:31:49,320 --> 00:31:49,330 you know you say well I don't know who 1299 00:31:49,330 --> 00:31:51,060 you know you say well I don't know who to call and I think it's important for 1300 00:31:51,060 --> 00:31:51,070 to call and I think it's important for 1301 00:31:51,070 --> 00:31:54,660 to call and I think it's important for us to remember as a global society that 1302 00:31:54,660 --> 00:31:54,670 us to remember as a global society that 1303 00:31:54,670 --> 00:31:55,980 us to remember as a global society that we're all in this together 1304 00:31:55,980 --> 00:31:55,990 we're all in this together 1305 00:31:55,990 --> 00:31:59,250 we're all in this together and that goes for the mom-and-pop shop 1306 00:31:59,250 --> 00:31:59,260 and that goes for the mom-and-pop shop 1307 00:31:59,260 --> 00:32:02,070 and that goes for the mom-and-pop shop that goes for the 2,000 user networks 1308 00:32:02,070 --> 00:32:02,080 that goes for the 2,000 user networks 1309 00:32:02,080 --> 00:32:03,960 that goes for the 2,000 user networks and that goes for your IT companies in 1310 00:32:03,960 --> 00:32:03,970 and that goes for your IT companies in 1311 00:32:03,970 --> 00:32:06,900 and that goes for your IT companies in your local community IT companies are 1312 00:32:06,900 --> 00:32:06,910 your local community IT companies are 1313 00:32:06,910 --> 00:32:08,940 your local community IT companies are seeing the exact same shift we are 1314 00:32:08,940 --> 00:32:08,950 seeing the exact same shift we are 1315 00:32:08,950 --> 00:32:11,150 seeing the exact same shift we are spending a great deal of our time 1316 00:32:11,150 --> 00:32:11,160 spending a great deal of our time 1317 00:32:11,160 --> 00:32:13,530 spending a great deal of our time assisting people like you 1318 00:32:13,530 --> 00:32:13,540 assisting people like you 1319 00:32:13,540 --> 00:32:18,000 assisting people like you in order to get secure safe remote work 1320 00:32:18,000 --> 00:32:18,010 in order to get secure safe remote work 1321 00:32:18,010 --> 00:32:20,220 in order to get secure safe remote work from home environment setup that's what 1322 00:32:20,220 --> 00:32:20,230 from home environment setup that's what 1323 00:32:20,230 --> 00:32:22,200 from home environment setup that's what we're here for right now for our 1324 00:32:22,200 --> 00:32:22,210 we're here for right now for our 1325 00:32:22,210 --> 00:32:25,200 we're here for right now for our community yeah I thought I think the the 1326 00:32:25,200 --> 00:32:25,210 community yeah I thought I think the the 1327 00:32:25,210 --> 00:32:29,190 community yeah I thought I think the the trusted managed service providers around 1328 00:32:29,190 --> 00:32:29,200 trusted managed service providers around 1329 00:32:29,200 --> 00:32:33,270 trusted managed service providers around the world are you know stepping up I've 1330 00:32:33,270 --> 00:32:33,280 the world are you know stepping up I've 1331 00:32:33,280 --> 00:32:36,650 the world are you know stepping up I've seen a lot of professionals online 1332 00:32:36,650 --> 00:32:36,660 seen a lot of professionals online 1333 00:32:36,660 --> 00:32:40,640 seen a lot of professionals online stepping up helping out and so on I mean 1334 00:32:40,640 --> 00:32:40,650 stepping up helping out and so on I mean 1335 00:32:40,650 --> 00:32:45,390 stepping up helping out and so on I mean one thing you could do is say if you for 1336 00:32:45,390 --> 00:32:45,400 one thing you could do is say if you for 1337 00:32:45,400 --> 00:32:49,530 one thing you could do is say if you for example use Twitter you know say anybody 1338 00:32:49,530 --> 00:32:49,540 example use Twitter you know say anybody 1339 00:32:49,540 --> 00:32:51,750 example use Twitter you know say anybody out there available to help with remote 1340 00:32:51,750 --> 00:32:51,760 out there available to help with remote 1341 00:32:51,760 --> 00:32:56,700 out there available to help with remote access small organization hashtag 1342 00:32:56,700 --> 00:32:56,710 access small organization hashtag 1343 00:32:56,710 --> 00:33:00,750 access small organization hashtag InfoSec would probably get somebody's 1344 00:33:00,750 --> 00:33:00,760 InfoSec would probably get somebody's 1345 00:33:00,760 --> 00:33:05,040 InfoSec would probably get somebody's attention you know there there are 1346 00:33:05,040 --> 00:33:05,050 attention you know there there are 1347 00:33:05,050 --> 00:33:06,780 attention you know there there are people I know some people who've been 1348 00:33:06,780 --> 00:33:06,790 people I know some people who've been 1349 00:33:06,790 --> 00:33:09,990 people I know some people who've been laid off in IT because their company's 1350 00:33:09,990 --> 00:33:10,000 laid off in IT because their company's 1351 00:33:10,000 --> 00:33:13,110 laid off in IT because their company's basically shutting down for a while yes 1352 00:33:13,110 --> 00:33:13,120 basically shutting down for a while yes 1353 00:33:13,120 --> 00:33:17,420 basically shutting down for a while yes of them are volunteering to help out and 1354 00:33:17,420 --> 00:33:17,430 of them are volunteering to help out and 1355 00:33:17,430 --> 00:33:20,550 of them are volunteering to help out and you know we those of us who have 1356 00:33:20,550 --> 00:33:20,560 you know we those of us who have 1357 00:33:20,560 --> 00:33:23,040 you know we those of us who have knowledge to share are willing to share 1358 00:33:23,040 --> 00:33:23,050 knowledge to share are willing to share 1359 00:33:23,050 --> 00:33:26,400 knowledge to share are willing to share it and you know stepping up to do that 1360 00:33:26,400 --> 00:33:26,410 it and you know stepping up to do that 1361 00:33:26,410 --> 00:33:28,280 it and you know stepping up to do that what 1362 00:33:28,280 --> 00:33:28,290 what 1363 00:33:28,290 --> 00:33:31,550 what it would be good if people had the sense 1364 00:33:31,550 --> 00:33:31,560 it would be good if people had the sense 1365 00:33:31,560 --> 00:33:33,380 it would be good if people had the sense that they don't have to go this a lot 1366 00:33:33,380 --> 00:33:33,390 that they don't have to go this a lot 1367 00:33:33,390 --> 00:33:36,530 that they don't have to go this a lot that you know if you've got a hardware 1368 00:33:36,530 --> 00:33:36,540 that you know if you've got a hardware 1369 00:33:36,540 --> 00:33:39,650 that you know if you've got a hardware store and you've got a small workforce 1370 00:33:39,650 --> 00:33:39,660 store and you've got a small workforce 1371 00:33:39,660 --> 00:33:43,100 store and you've got a small workforce that could do some work remotely they're 1372 00:33:43,100 --> 00:33:43,110 that could do some work remotely they're 1373 00:33:43,110 --> 00:33:45,950 that could do some work remotely they're doing it for the first time don't feel 1374 00:33:45,950 --> 00:33:45,960 doing it for the first time don't feel 1375 00:33:45,960 --> 00:33:47,360 doing it for the first time don't feel bad that you don't know how to do this 1376 00:33:47,360 --> 00:33:47,370 bad that you don't know how to do this 1377 00:33:47,370 --> 00:33:51,620 bad that you don't know how to do this um you know I don't feel it's really I'm 1378 00:33:51,620 --> 00:33:51,630 um you know I don't feel it's really I'm 1379 00:33:51,630 --> 00:33:54,380 um you know I don't feel it's really I'm not gonna try and fix this piece of my 1380 00:33:54,380 --> 00:33:54,390 not gonna try and fix this piece of my 1381 00:33:54,390 --> 00:33:55,550 not gonna try and fix this piece of my house that's broken without a 1382 00:33:55,550 --> 00:33:55,560 house that's broken without a 1383 00:33:55,560 --> 00:33:57,350 house that's broken without a professional try and reach out get a 1384 00:33:57,350 --> 00:33:57,360 professional try and reach out get a 1385 00:33:57,360 --> 00:33:59,810 professional try and reach out get a professional to help set this up I don't 1386 00:33:59,810 --> 00:33:59,820 professional to help set this up I don't 1387 00:33:59,820 --> 00:34:01,400 professional to help set this up I don't mind admitting I don't know how the gas 1388 00:34:01,400 --> 00:34:01,410 mind admitting I don't know how the gas 1389 00:34:01,410 --> 00:34:03,350 mind admitting I don't know how the gas boiler in this place works I need a 1390 00:34:03,350 --> 00:34:03,360 boiler in this place works I need a 1391 00:34:03,360 --> 00:34:07,419 boiler in this place works I need a professional to service it yeah I think 1392 00:34:07,419 --> 00:34:07,429 professional to service it yeah I think 1393 00:34:07,429 --> 00:34:11,300 professional to service it yeah I think we do see many examples you know online 1394 00:34:11,300 --> 00:34:11,310 we do see many examples you know online 1395 00:34:11,310 --> 00:34:14,900 we do see many examples you know online and in the media of people stepping up 1396 00:34:14,900 --> 00:34:14,910 and in the media of people stepping up 1397 00:34:14,910 --> 00:34:20,060 and in the media of people stepping up to help and I think reaching out and 1398 00:34:20,060 --> 00:34:20,070 to help and I think reaching out and 1399 00:34:20,070 --> 00:34:23,450 to help and I think reaching out and asking for professional help is the way 1400 00:34:23,450 --> 00:34:23,460 asking for professional help is the way 1401 00:34:23,460 --> 00:34:27,919 asking for professional help is the way to go and if you need it if your company 1402 00:34:27,919 --> 00:34:27,929 to go and if you need it if your company 1403 00:34:27,929 --> 00:34:30,409 to go and if you need it if your company hasn't been doing this for a while you 1404 00:34:30,409 --> 00:34:30,419 hasn't been doing this for a while you 1405 00:34:30,419 --> 00:34:33,200 hasn't been doing this for a while you know and as we talked about earlier in 1406 00:34:33,200 --> 00:34:33,210 know and as we talked about earlier in 1407 00:34:33,210 --> 00:34:37,370 know and as we talked about earlier in the area of security awareness education 1408 00:34:37,370 --> 00:34:37,380 the area of security awareness education 1409 00:34:37,380 --> 00:34:42,110 the area of security awareness education there are free resources out there you 1410 00:34:42,110 --> 00:34:42,120 there are free resources out there you 1411 00:34:42,120 --> 00:34:44,060 there are free resources out there you know if you're a manager and you want to 1412 00:34:44,060 --> 00:34:44,070 know if you're a manager and you want to 1413 00:34:44,070 --> 00:34:47,030 know if you're a manager and you want to bring people up to speed look online for 1414 00:34:47,030 --> 00:34:47,040 bring people up to speed look online for 1415 00:34:47,040 --> 00:34:48,830 bring people up to speed look online for free security awareness training for a 1416 00:34:48,830 --> 00:34:48,840 free security awareness training for a 1417 00:34:48,840 --> 00:34:51,169 free security awareness training for a chick check it up make sure it's a 1418 00:34:51,169 --> 00:34:51,179 chick check it up make sure it's a 1419 00:34:51,179 --> 00:34:54,080 chick check it up make sure it's a legitimate company i I have no financial 1420 00:34:54,080 --> 00:34:54,090 legitimate company i I have no financial 1421 00:34:54,090 --> 00:34:56,000 legitimate company i I have no financial stake and he said any more of it they've 1422 00:34:56,000 --> 00:34:56,010 stake and he said any more of it they've 1423 00:34:56,010 --> 00:34:59,840 stake and he said any more of it they've got some good stuff and imagining the 1424 00:34:59,840 --> 00:34:59,850 got some good stuff and imagining the 1425 00:34:59,850 --> 00:35:01,430 got some good stuff and imagining the process of making a list of these to 1426 00:35:01,430 --> 00:35:01,440 process of making a list of these to 1427 00:35:01,440 --> 00:35:06,980 process of making a list of these to post on Twitter had to send an email to 1428 00:35:06,980 --> 00:35:06,990 post on Twitter had to send an email to 1429 00:35:06,990 --> 00:35:09,860 post on Twitter had to send an email to employees I mean if there are employees 1430 00:35:09,860 --> 00:35:09,870 employees I mean if there are employees 1431 00:35:09,870 --> 00:35:11,420 employees I mean if there are employees who don't have as much work to do as 1432 00:35:11,420 --> 00:35:11,430 who don't have as much work to do as 1433 00:35:11,430 --> 00:35:14,290 who don't have as much work to do as normal now would be a great time 1434 00:35:14,290 --> 00:35:14,300 normal now would be a great time 1435 00:35:14,300 --> 00:35:17,000 normal now would be a great time security awareness training yes yeah and 1436 00:35:17,000 --> 00:35:17,010 security awareness training yes yeah and 1437 00:35:17,010 --> 00:35:19,370 security awareness training yes yeah and I'm just gonna say I mean we're I don't 1438 00:35:19,370 --> 00:35:19,380 I'm just gonna say I mean we're I don't 1439 00:35:19,380 --> 00:35:20,870 I'm just gonna say I mean we're I don't want to send mixed signals because we're 1440 00:35:20,870 --> 00:35:20,880 want to send mixed signals because we're 1441 00:35:20,880 --> 00:35:22,310 want to send mixed signals because we're telling you be really careful what 1442 00:35:22,310 --> 00:35:22,320 telling you be really careful what 1443 00:35:22,320 --> 00:35:24,020 telling you be really careful what you're searching for because the the 1444 00:35:24,020 --> 00:35:24,030 you're searching for because the the 1445 00:35:24,030 --> 00:35:25,610 you're searching for because the the criminals are out there trying to 1446 00:35:25,610 --> 00:35:25,620 criminals are out there trying to 1447 00:35:25,620 --> 00:35:27,590 criminals are out there trying to socially engineer you know and trick you 1448 00:35:27,590 --> 00:35:27,600 socially engineer you know and trick you 1449 00:35:27,600 --> 00:35:29,390 socially engineer you know and trick you in to clicking the wrong links so what 1450 00:35:29,390 --> 00:35:29,400 in to clicking the wrong links so what 1451 00:35:29,400 --> 00:35:30,770 in to clicking the wrong links so what we're going to do is we're gonna provide 1452 00:35:30,770 --> 00:35:30,780 we're going to do is we're gonna provide 1453 00:35:30,780 --> 00:35:32,570 we're going to do is we're gonna provide some of these resources for you that we 1454 00:35:32,570 --> 00:35:32,580 some of these resources for you that we 1455 00:35:32,580 --> 00:35:34,850 some of these resources for you that we already know are trusted and true we're 1456 00:35:34,850 --> 00:35:34,860 already know are trusted and true we're 1457 00:35:34,860 --> 00:35:37,280 already know are trusted and true we're gonna provide those at blog dot endpoint 1458 00:35:37,280 --> 00:35:37,290 gonna provide those at blog dot endpoint 1459 00:35:37,290 --> 00:35:39,740 gonna provide those at blog dot endpoint security dot CA and those will be 1460 00:35:39,740 --> 00:35:39,750 security dot CA and those will be 1461 00:35:39,750 --> 00:35:42,109 security dot CA and those will be available to you just to help give 1462 00:35:42,109 --> 00:35:42,119 available to you just to help give 1463 00:35:42,119 --> 00:35:44,630 available to you just to help give you a good head start at some free 1464 00:35:44,630 --> 00:35:44,640 you a good head start at some free 1465 00:35:44,640 --> 00:35:46,160 you a good head start at some free resources that are that you can just 1466 00:35:46,160 --> 00:35:46,170 resources that are that you can just 1467 00:35:46,170 --> 00:35:48,289 resources that are that you can just click through and it will provide some 1468 00:35:48,289 --> 00:35:48,299 click through and it will provide some 1469 00:35:48,299 --> 00:35:49,940 click through and it will provide some descriptive text there to help you to 1470 00:35:49,940 --> 00:35:49,950 descriptive text there to help you to 1471 00:35:49,950 --> 00:35:51,890 descriptive text there to help you to find what you're looking for you're good 1472 00:35:51,890 --> 00:35:51,900 find what you're looking for you're good 1473 00:35:51,900 --> 00:35:54,710 find what you're looking for you're good Stephen Cobb I appreciate you so much 1474 00:35:54,710 --> 00:35:54,720 Stephen Cobb I appreciate you so much 1475 00:35:54,720 --> 00:35:57,739 Stephen Cobb I appreciate you so much I'm so glad to see you again and you 1476 00:35:57,739 --> 00:35:57,749 I'm so glad to see you again and you 1477 00:35:57,749 --> 00:35:59,710 I'm so glad to see you again and you look at you're looking well 1478 00:35:59,710 --> 00:35:59,720 look at you're looking well 1479 00:35:59,720 --> 00:36:02,599 look at you're looking well same same back to you and take care of 1480 00:36:02,599 --> 00:36:02,609 same same back to you and take care of 1481 00:36:02,609 --> 00:36:05,870 same same back to you and take care of yourself and your family and I think 1482 00:36:05,870 --> 00:36:05,880 yourself and your family and I think 1483 00:36:05,880 --> 00:36:10,069 yourself and your family and I think well we'll we'll keep fighting on we're 1484 00:36:10,069 --> 00:36:10,079 well we'll we'll keep fighting on we're 1485 00:36:10,079 --> 00:36:11,359 well we'll we'll keep fighting on we're gonna see this through together folks 1486 00:36:11,359 --> 00:36:11,369 gonna see this through together folks 1487 00:36:11,369 --> 00:36:13,160 gonna see this through together folks okay take care thanks Ruby 1488 00:36:13,160 --> 00:36:13,170 okay take care thanks Ruby 1489 00:36:13,170 --> 00:36:15,680 okay take care thanks Ruby thanks so much Stephen and thank you for 1490 00:36:15,680 --> 00:36:15,690 thanks so much Stephen and thank you for 1491 00:36:15,690 --> 00:36:17,180 thanks so much Stephen and thank you for joining us this week I hope that you've 1492 00:36:17,180 --> 00:36:17,190 joining us this week I hope that you've 1493 00:36:17,190 --> 00:36:18,739 joining us this week I hope that you've taken in some great information 1494 00:36:18,739 --> 00:36:18,749 taken in some great information 1495 00:36:18,749 --> 00:36:20,269 taken in some great information again those resources will be on our 1496 00:36:20,269 --> 00:36:20,279 again those resources will be on our 1497 00:36:20,279 --> 00:36:22,880 again those resources will be on our website so be sure to check those out as 1498 00:36:22,880 --> 00:36:22,890 website so be sure to check those out as 1499 00:36:22,890 --> 00:36:25,460 website so be sure to check those out as well in the meantime I'm Robbie Ferguson 1500 00:36:25,460 --> 00:36:25,470 well in the meantime I'm Robbie Ferguson 1501 00:36:25,470 --> 00:36:26,839 well in the meantime I'm Robbie Ferguson for the endpoint security dossier 1502 00:36:26,839 --> 00:36:26,849 for the endpoint security dossier 1503 00:36:26,849 --> 00:36:29,809 for the endpoint security dossier podcast from positive II solutions and I 1504 00:36:29,809 --> 00:36:29,819 podcast from positive II solutions and I 1505 00:36:29,819 --> 00:36:32,390 podcast from positive II solutions and I wish you and your families your staff 1506 00:36:32,390 --> 00:36:32,400 wish you and your families your staff 1507 00:36:32,400 --> 00:36:34,489 wish you and your families your staff your loved ones all the best 1508 00:36:34,489 --> 00:36:34,499 your loved ones all the best 1509 00:36:34,499 --> 00:36:36,620 your loved ones all the best take care during this time and we'll see 1510 00:36:36,620 --> 00:36:36,630 take care during this time and we'll see 1511 00:36:36,630 --> 00:36:39,350 take care during this time and we'll see you again very soon bye for now 1512 00:36:39,350 --> 00:36:39,360 you again very soon bye for now 1513 00:36:39,360 --> 00:36:53,239 you again very soon bye for now [Music]